# Confidential Computing and Secure Execution on IBM Mainframes > [! note]- > The content of this page is generated by audio/video transcription and text transformation from the content and links of this source. Source: [https://fosdem.org/2025/schedule/event/fosdem-2025-6727-confidential-computing-devroom-lightning-talks/](https://fosdem.org/2025/schedule/event/fosdem-2025-6727-confidential-computing-devroom-lightning-talks/) <video src="https://video.fosdem.org/2025/k4401/fosdem-2025-6727-confidential-computing-devroom-lightning-talks.av1.webm" controls></video> ## Summary & Highlights: The session at FOSDEM 2025 on Confidential Computing devroom lightning talks highlights significant challenges and solutions in the realm of confidential computing, particularly focusing on remote attestation and secure execution on IBM Mainframes. **Remote Attestation Challenges** The session begins with an exploration of the limitations of current CPU-based remote attestation, which only measures the initial boot process of virtual machines (VMs). The talk raises critical questions about the trustworthiness of TPM implementations and the reliability of attestation results provided by cloud vendors. The discussion extends to the complexities of VM migration and the trust issues surrounding key management in VPPM (Virtual Platform Protection Module) implementations. **IBM Secure Execution for Mainframes** The session then shifts focus to IBM's Secure Execution for Linux on mainframes, also known as S390. This solution emphasizes access control, where the untrusted host cannot access the secure guest's memory. The ultravisor, a trusted hardware and firmware entity, acts as a secure interface. The session highlights the importance of encrypted boot images and introduces the concept of retrieval secrets, ensuring that keys remain protected even during use. **Implications for Confidential Computing** The session concludes by discussing the broader implications of these technologies for confidential computing, emphasizing the need for open-source implementations and trust in key management processes. The talks underscore the importance of addressing responsibility issues in measuring, signing, and managing attestation processes to foster a secure and transparent computing environment. ## Importance for an eco-social transformation This session is crucial for eco-social transformation as it addresses the ethical and security challenges in cloud computing, which are vital for trust in digital infrastructures. Confidential computing solutions, like those discussed, can enhance data privacy and security, essential for sustainable digital ecosystems. For eco-social designers, the session highlights the importance of open-source solutions and transparent key management processes. Challenges include ensuring open access to proprietary technologies and fostering collaboration between stakeholders to overcome technical and political hurdles. These technologies can be applied to develop secure and sustainable digital services, promoting trust and ethical standards in community-oriented digital transformations. ## Links [Video recording (AV1/WebM)](https://video.fosdem.org/2025/k4401/fosdem-2025-6727-confidential-computing-devroom-lightning-talks.av1.webm) - 25.5 MB [Video recording (MP4)](https://video.fosdem.org/2025/k4401/fosdem-2025-6727-confidential-computing-devroom-lightning-talks.av1.mp4) - 167.5 MB [Video recording subtitle file (VTT)]() [Chat room(web)]() [Chat room(app)]()