incubator-teaclave-sgx-sdk
confidential-computing-zoo
incubator-teaclave-sgx-sdk | confidential-computing-zoo | |
---|---|---|
4 | 2 | |
1,148 | 285 | |
0.5% | 0.0% | |
3.4 | 7.1 | |
about 1 month ago | about 1 month ago | |
Rust | CMake | |
Apache License 2.0 | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
incubator-teaclave-sgx-sdk
-
How to protect information in memory?
https://github.com/apache/incubator-teaclave-sgx-sdk would be a create for this.
-
BlindAI: fast and privacy-friendly AI deployment solution in Rust
I am glad to introduce BlindAI, an AI deployment solution, leveraging secure enclaves, to make remotely hosted AI models privacy friendly. We leverage the tract project as our inference engine to serve AI models in ONNX format inside an enclave. We also use the Rust SGX SDK to use Rust for our secure enclave for AI.
-
Cargo patches
I am wondering something. If you have a look to this Cargo.toml file on github you could see at line 10 that the crate "sgx_crypto_helper" is declared as a dependency which is here a git repository. However you can see at line 19 that the same dependency "sgx_crypto_helper" is also declared with basically the same path... so I'm wondering what is the purpose of this?
confidential-computing-zoo
What are some alternatives?
blindai - Confidential AI deployment with secure enclaves :lock:
edgelessdb - EdgelessDB is a MySQL-compatible database for confidential computing. It runs entirely inside a secure enclave and comes with advanced features for collaboration, recovery, and access control.
deno - A modern runtime for JavaScript and TypeScript.
enclaive-docker-nginx-sgx - SGX-ready Enclaive Docker Image for Nginx
tract - Tiny, no-nonsense, self-contained, Tensorflow and ONNX inference
keylime - A CNCF Project to Bootstrap & Maintain Trust on the Edge / Cloud and IoT
rust - Empowering everyone to build reliable and efficient software.
ego - EGo is an open-source SDK that enables you to develop your own confidential apps in the Go programming language.
incubator-teaclave-trustzone-sdk - Teaclave TrustZone SDK enables safe, functional, and ergonomic development of trustlets.
marblerun - MarbleRun is the control plane for confidential computing. Deploy, scale, and verify your confidential microservices on vanilla Kubernetes. 100% Go, 100% cloud native, 100% confidential.