Confidential Documentation
New to Confidential? Start with our Product APIs.
New to confidential computing at large? Start with the Confidential Computing Primer.
Product APIs
- Confidential Agents API: REST API to provision and manage confidential agents in CVMs.
Whitepapers
- C8s: Confidential Kubernetes: Learn about C8s, our confidential Kubernetes architecture.
- Kettle: Attested Builds: Learn about Kettle, our attested build system for verifiable software provenance.
Guides
- Confidential Computing Primer: A comprehensive guide on Confidential Computing and how it works underneath the hood.
- Introduction to TEEs: A high-level introduction to Trusted Execution Environments: what they are, how they work, and their limitations.
- Attestable Builds: Learn what attestable builds are, why they matter, and how TEEs make software verification possible.
- Zero Knowledge: Learn about zero-knowledge (ZK) proofs and their applications.
- Confidential Agents API: Reference for the public REST API that provisions and manages confidential VM instances.
Need Help?
Don't see what you're looking for? Contact us. We're here to help.