usage of confidential computing in several phases makes certain that the information is usually processed, and versions might be produced when preserving the information confidential even when whilst in use.
info and https://doctorbookmark.com/story18352568/prepared-for-ai-act-secrets