Together, remote attestation, encrypted conversation, and memory isolation present every thing that's required to prolong a confidential-computing setting from a CVM or even a secure enclave into a GPU.
Abruptly, https://shaunaqpdj701272.mdkblog.com/36101283/confidential-computing-generative-ai-an-overview