This defense product can be deployed In the Confidential Computing ecosystem (determine 3) and sit with the first product to offer feedback to an inference block (Figure four). This permits the AI procedure to determine on remedial actions within the function of an attack. Crucially, owing to remote attestation, end users of expert services hosted