We just spoke to the importance of potent data protection steps, such as data encryption, when sensitive facts is at relaxation. But data in use is particularly vulnerable to theft, and so involves extra security https://socialistener.com/story3425070/5-simple-statements-about-confidential-computing-explained