How confidential computing functions ahead of it could be processed by an software, data must be unencrypted in memory. This leaves the data susceptible prior to, in the course of and immediately after processing to memory dumps, root user compromises and other malicious exploits. (A) any ongoing or prepared actions conne