Replies (1)

We use confidential computing providers and chain together the cryptographic attestations.