# Confidential Computings Evolution and Future at FOSDEM 2025
> [! note]-
> The content of this page is generated by audio/video transcription and text transformation from the content and links of this source.
Source: [https://fosdem.org/2025/schedule/event/fosdem-2025-5002-confidential-computing-s-recent-past-emerging-present-and-long-lasting-future/](https://fosdem.org/2025/schedule/event/fosdem-2025-5002-confidential-computing-s-recent-past-emerging-present-and-long-lasting-future/)
<video src="https://video.fosdem.org/2025/k4401/fosdem-2025-5002-confidential-computing-s-recent-past-emerging-present-and-long-lasting-future.av1.webm" controls></video>
## Summary & Highlights:
**Introduction to Confidential Computing**
Confidential Computing (CC) is becoming a cornerstone of cybersecurity by securing sensitive workloads in Trusted Execution Environments (TEEs). This session at FOSDEM 2025 explores CC's history, current challenges, and future, emphasizing its growing relevance in the cybersecurity landscape.
**Historical Context and Evolution**
The session provides a historical overview of CC, tracing its roots back to early concepts of privacy-preserving computation in 1978 and the development of secure kernels. It highlights key milestones, such as the introduction of TEEs by Intel in 2015 and the formation of the Confidential Computing Consortium in 2019.
**Current Challenges and Applications**
Today, CC is crucial for protecting data in use, addressing threats like insider threats, compromised applications, and multi-party data collaboration. The session discusses CC's integration with broader cybersecurity fields, including supply chain security and threat modeling.
**Future Directions and Regulatory Impacts**
The session outlines a forward-looking vision for CC, highlighting its role in addressing evolving threats and ensuring data integrity. It also discusses regulatory impacts, including the EU's Digital Operational Resilience Act (DORA), which mandates runtime data security.
**Practical Insights for Adoption**
Attendees will gain insights into fostering CC adoption across industries and regulatory landscapes. The session emphasizes the importance of communicating CC's value and integrating it into security workflows.
## Importance for an eco-social transformation
Confidential Computing is crucial for eco-social transformation as it addresses privacy and security concerns in data-driven societies. It offers tools for protecting sensitive data, enabling secure multi-party collaborations, and ensuring data integrity and confidentiality. For eco-social designers, CC provides platforms like Trusted Execution Environments (TEEs) and open-source projects like Keystone, which can be leveraged to create secure systems. Challenges include navigating regulatory landscapes and ensuring widespread adoption across industries. Open questions remain on balancing transparency with privacy and addressing potential ethical concerns in data handling.
## Slides:
| | |
| --- | --- |
| ![[FOSDEM 2025/assets/Confidential-Computings-Recent-Past-Emerging-Prese/preview_001.jpg\|300]] | The first slide introduces the session on Confidential Computing, outlining the focus on its past, present, and future. It sets the stage for understanding the evolution and significance of Confidential Computing in modern cybersecurity.
| ![[FOSDEM 2025/assets/Confidential-Computings-Recent-Past-Emerging-Prese/preview_002.jpg\|300]] | The second slide provides an overview of the session's content, presented by Sal Kimmich, Technical Community Architect at the Confidential Computing Consortium. It highlights the key topics: the historical evolution of Confidential Computing, current advancements, and future implications.
| ![[FOSDEM 2025/assets/Confidential-Computings-Recent-Past-Emerging-Prese/preview_003.jpg\|300]] | The third slide emphasizes the historical context of Confidential Computing, tracing its roots back to early privacy-preserving computation concepts. It highlights significant milestones such as the introduction of Fully Homomorphic Encryption in 2009 and the launch of Intel's Trusted Execution Environments in 2015.
| ![[FOSDEM 2025/assets/Confidential-Computings-Recent-Past-Emerging-Prese/preview_004.jpg\|300]] | The fourth slide outlines the key themes of the session: the evolution from secure kernels to Confidential Computing, the present focus on remote attestation and confidential containers, and the future potential of open security for sensitive compute.
| ![[FOSDEM 2025/assets/Confidential-Computings-Recent-Past-Emerging-Prese/preview_005.jpg\|300]] | The fifth slide delves into the history of Confidential Computing, detailing significant developments from the 1960s to the present. It highlights the introduction of secure kernels, the launch of Intel's first chip, and the establishment of the Confidential Computing Consortium.
| ![[FOSDEM 2025/assets/Confidential-Computings-Recent-Past-Emerging-Prese/preview_006.jpg\|300]] | The sixth slide continues the historical overview, focusing on key developments in secure kernels and Confidential Computing. It highlights the introduction of Fully Homomorphic Encryption, Intel's Trusted Execution Environments, and the establishment of the Confidential Computing Consortium.
| ![[FOSDEM 2025/assets/Confidential-Computings-Recent-Past-Emerging-Prese/preview_007.jpg\|300]] | The seventh slide provides a detailed timeline of the evolution of secure kernels and Confidential Computing. It highlights key milestones such as the introduction of secure kernels by Ferranti Atlas, Intel's first chip release, and the launch of Trusted Execution Environments by Intel.
| ![[FOSDEM 2025/assets/Confidential-Computings-Recent-Past-Emerging-Prese/preview_008.jpg\|300]] | The eighth slide discusses the history of secure kernels, emphasizing their foundation on predicate calculus and formal verification methods. It highlights the development of KSOS and A1-Class Security Kernels, which laid the groundwork for Confidential Computing.
| ![[FOSDEM 2025/assets/Confidential-Computings-Recent-Past-Emerging-Prese/preview_009.jpg\|300]] | The ninth slide concludes the historical overview, emphasizing the transition from secure kernels to Confidential Computing. It highlights the redefined threat model, excluding the platform OS from the Trusted Computing Base, and enhancing security through Trusted Execution Environments.
| ![[FOSDEM 2025/assets/Confidential-Computings-Recent-Past-Emerging-Prese/preview_010.jpg\|300]] | The tenth slide shifts focus to the present, discussing the highest order threats that Confidential Computing aims to prevent. It highlights the importance of securing systems against insider threats, compromised applications, and multi-party data collaboration.
| ![[FOSDEM 2025/assets/Confidential-Computings-Recent-Past-Emerging-Prese/preview_011.jpg\|300]] | |
| ![[FOSDEM 2025/assets/Confidential-Computings-Recent-Past-Emerging-Prese/preview_012.jpg\|300]] | |
| ![[FOSDEM 2025/assets/Confidential-Computings-Recent-Past-Emerging-Prese/preview_013.jpg\|300]] | |
| ![[FOSDEM 2025/assets/Confidential-Computings-Recent-Past-Emerging-Prese/preview_014.jpg\|300]] | |
| ![[FOSDEM 2025/assets/Confidential-Computings-Recent-Past-Emerging-Prese/preview_015.jpg\|300]] | |
| ![[FOSDEM 2025/assets/Confidential-Computings-Recent-Past-Emerging-Prese/preview_016.jpg\|300]] | |
| ![[FOSDEM 2025/assets/Confidential-Computings-Recent-Past-Emerging-Prese/preview_017.jpg\|300]] | |
| ![[FOSDEM 2025/assets/Confidential-Computings-Recent-Past-Emerging-Prese/preview_018.jpg\|300]] | |
| ![[FOSDEM 2025/assets/Confidential-Computings-Recent-Past-Emerging-Prese/preview_019.jpg\|300]] | |
| ![[FOSDEM 2025/assets/Confidential-Computings-Recent-Past-Emerging-Prese/preview_020.jpg\|300]] | |
| ![[FOSDEM 2025/assets/Confidential-Computings-Recent-Past-Emerging-Prese/preview_021.jpg\|300]] | |
| ![[FOSDEM 2025/assets/Confidential-Computings-Recent-Past-Emerging-Prese/preview_022.jpg\|300]] | |
| ![[FOSDEM 2025/assets/Confidential-Computings-Recent-Past-Emerging-Prese/preview_023.jpg\|300]] | |
| ![[FOSDEM 2025/assets/Confidential-Computings-Recent-Past-Emerging-Prese/preview_024.jpg\|300]] | |
| ![[FOSDEM 2025/assets/Confidential-Computings-Recent-Past-Emerging-Prese/preview_025.jpg\|300]] | |
| ![[FOSDEM 2025/assets/Confidential-Computings-Recent-Past-Emerging-Prese/preview_026.jpg\|300]] | |
| ![[FOSDEM 2025/assets/Confidential-Computings-Recent-Past-Emerging-Prese/preview_027.jpg\|300]] | |
| ![[FOSDEM 2025/assets/Confidential-Computings-Recent-Past-Emerging-Prese/preview_028.jpg\|300]] | |
| ![[FOSDEM 2025/assets/Confidential-Computings-Recent-Past-Emerging-Prese/preview_029.jpg\|300]] | |
| ![[FOSDEM 2025/assets/Confidential-Computings-Recent-Past-Emerging-Prese/preview_030.jpg\|300]] | |
| ![[FOSDEM 2025/assets/Confidential-Computings-Recent-Past-Emerging-Prese/preview_031.jpg\|300]] | |
| ![[FOSDEM 2025/assets/Confidential-Computings-Recent-Past-Emerging-Prese/preview_032.jpg\|300]] | |
| ![[FOSDEM 2025/assets/Confidential-Computings-Recent-Past-Emerging-Prese/preview_033.jpg\|300]] | |
| ![[FOSDEM 2025/assets/Confidential-Computings-Recent-Past-Emerging-Prese/preview_034.jpg\|300]] | |
| ![[FOSDEM 2025/assets/Confidential-Computings-Recent-Past-Emerging-Prese/preview_035.jpg\|300]] | |
| ![[FOSDEM 2025/assets/Confidential-Computings-Recent-Past-Emerging-Prese/preview_036.jpg\|300]] | |
| ![[FOSDEM 2025/assets/Confidential-Computings-Recent-Past-Emerging-Prese/preview_037.jpg\|300]] | |
| ![[FOSDEM 2025/assets/Confidential-Computings-Recent-Past-Emerging-Prese/preview_038.jpg\|300]] | |
| ![[FOSDEM 2025/assets/Confidential-Computings-Recent-Past-Emerging-Prese/preview_039.jpg\|300]] | |
| ![[FOSDEM 2025/assets/Confidential-Computings-Recent-Past-Emerging-Prese/preview_040.jpg\|300]] | |
| ![[FOSDEM 2025/assets/Confidential-Computings-Recent-Past-Emerging-Prese/preview_041.jpg\|300]] | |
| ![[FOSDEM 2025/assets/Confidential-Computings-Recent-Past-Emerging-Prese/preview_042.jpg\|300]] | |
| ![[FOSDEM 2025/assets/Confidential-Computings-Recent-Past-Emerging-Prese/preview_043.jpg\|300]] | |
| ![[FOSDEM 2025/assets/Confidential-Computings-Recent-Past-Emerging-Prese/preview_044.jpg\|300]] | |
| ![[FOSDEM 2025/assets/Confidential-Computings-Recent-Past-Emerging-Prese/preview_045.jpg\|300]] | |
| ![[FOSDEM 2025/assets/Confidential-Computings-Recent-Past-Emerging-Prese/preview_046.jpg\|300]] | |
| ![[FOSDEM 2025/assets/Confidential-Computings-Recent-Past-Emerging-Prese/preview_047.jpg\|300]] | |
| ![[FOSDEM 2025/assets/Confidential-Computings-Recent-Past-Emerging-Prese/preview_048.jpg\|300]] | |
## Links
[Slides](https://fosdem.org/2025/events/attachments/fosdem-2025-5002-confidential-computing-s-recent-past-emerging-present-and-long-lasting-future/slides/237828/Confident_fRySvCW.pdf)
[Video recording (MP4)](https://video.fosdem.org/2025/k4401/fosdem-2025-5002-confidential-computing-s-recent-past-emerging-present-and-long-lasting-future.av1.mp4)
[Video recording (AV1/WebM)](https://video.fosdem.org/2025/k4401/fosdem-2025-5002-confidential-computing-s-recent-past-emerging-present-and-long-lasting-future.av1.webm)