Marks marks@primal.net 6 months ago We use confidential computing providers and chain together the cryptographic attestations.