Yeah that's a good point, I don't call that confidential compute though it's a different use case.
CoCo = protecting consumer data from the industry. DRM = protecting industry bullshit from the consumer.
TBF my understanding is that in the DRM usecases they achieve actual security by squeezing the TCB into a single die. And I think if anyone tries, they generally still always get pwned by physical attackers even though it's supposedly in scope for the threat model.
CoCo = protecting consumer data from the industry. DRM = protecting industry bullshit from the consumer.
TBF my understanding is that in the DRM usecases they achieve actual security by squeezing the TCB into a single die. And I think if anyone tries, they generally still always get pwned by physical attackers even though it's supposedly in scope for the threat model.