usage of confidential computing in different levels ensures that the information may be processed, and models could be designed though preserving the information confidential even when while in use.
to the https://gorillasocialwork.com/story19378539/the-ultimate-guide-to-ai-act-safety-component