<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web02.fireside.fm</fireside:hostname>
    <fireside:genDate>Sun, 19 Apr 2026 12:45:28 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>Dave &amp; Gunnar Show - Episodes Tagged with “Confidential Computing”</title>
    <link>https://dgshow.org/tags/confidential%20computing</link>
    <pubDate>Fri, 04 Nov 2022 05:00:00 -0500</pubDate>
    <description>David Egts and Gunnar Hellekson discuss privacy, security, robots, and internet ephemera.
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>Not our circus, not our monkey.</itunes:subtitle>
    <itunes:author>David Egts &amp; Gunnar Hellekson</itunes:author>
    <itunes:summary>David Egts and Gunnar Hellekson discuss privacy, security, robots, and internet ephemera.
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/1/1b67eddd-d80f-444d-ba32-aa9ef36b589d/cover.jpg?v=2"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>privacy, security, robots, internet, open source, technology</itunes:keywords>
    <itunes:owner>
      <itunes:name>David Egts &amp; Gunnar Hellekson</itunes:name>
      <itunes:email>gunnar@hellekson.com</itunes:email>
    </itunes:owner>
<itunes:category text="Society &amp; Culture"/>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Technology"/>
<item>
  <title>Episode 239: The Bottom Turtle</title>
  <link>https://dgshow.org/239</link>
  <guid isPermaLink="false">3be567ec-edff-4ba6-92d8-337d05cfbf35</guid>
  <pubDate>Fri, 04 Nov 2022 05:00:00 -0500</pubDate>
  <author>David Egts &amp; Gunnar Hellekson</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/1b67eddd-d80f-444d-ba32-aa9ef36b589d/3be567ec-edff-4ba6-92d8-337d05cfbf35.mp3" length="13998467" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>David Egts &amp; Gunnar Hellekson</itunes:author>
  <itunes:subtitle>This week Dave talks with Mike Bursell about his new book, Trust in Computer Systems and the Cloud!</itunes:subtitle>
  <itunes:duration>29:10</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/1/1b67eddd-d80f-444d-ba32-aa9ef36b589d/episodes/3/3be567ec-edff-4ba6-92d8-337d05cfbf35/cover.jpg?v=1"/>
  <description>This week Dave talks with Mike Bursell (https://dgshow.org/guests/mbursell) about his new book, Trust in Computer Systems and the Cloud (https://www.wiley.com/en-us/Trust+in+Computer+Systems+and+the+Cloud-p-9781119692324)!
Check out Mike Bursell (https://dgshow.org/guests/mbursell) and Nathaniel McCallum (https://dgshow.org/guests/nmccallum) on episode 237 (https://dgshow.org/237)!
Trust in Computer Systems and the Cloud (https://www.wiley.com/en-us/Trust+in+Computer+Systems+and+the+Cloud-p-9781119692324) by Mike Bursell
Profian (https://www.profian.com/)
Defcon (https://defcon.org/)
Blockchain (https://en.wikipedia.org/wiki/Blockchain)
Zero Trust (https://en.wikipedia.org/wiki/Zero_trust_security_model): Poorly named? Would Explicit Trust be more accurate?
Reflections on Trusting Trust (http://www.ece.cmu.edu/~ganger/712.fall02/papers/p761-thompson.pdf) by Ken Thompson (https://en.wikipedia.org/wiki/Ken_Thompson) 
Trusted Platform Module (TPM) (https://en.wikipedia.org/wiki/Trusted_Platform_Module)
Hardware Security Module (HSM) (https://en.wikipedia.org/wiki/Hardware_security_module)
Trusted Execution Environment (TEE) (https://en.wikipedia.org/wiki/Trusted_execution_environment)
Trusted computing (https://en.wikipedia.org/wiki/Trusted_Computing)
Confidential computing – the new HTTPS? (https://aliceevebob.com/2019/12/03/confidential-computing-the-new-https/)
Enarx (https://enarx.dev/)
Idris Elba (https://en.wikipedia.org/wiki/Idris_Elba)
Horrible Histories (https://en.wikipedia.org/wiki/Horrible_Histories_(2001_TV_series))
We Give Thanks
* Mike Bursell (https://dgshow.org/guests/mbursell), for joining us on the show! Special Guest: Mike Bursell.
</description>
  <itunes:keywords>Trust in Computer Systems and the Cloud, trust, Profian, Defcon, blockchain, zero trust, Reflections on Trusting Trust, Ken Thompson, trusted platform modules, TPM, hardware security modules, HSM, trusted execution environments, TEE, trusted computing, confidential computing, Enarx, Idris Elba, Horrible Histories</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week Dave talks with <a href="https://dgshow.org/guests/mbursell" rel="nofollow">Mike Bursell</a> about his new book, <em><a href="https://www.wiley.com/en-us/Trust+in+Computer+Systems+and+the+Cloud-p-9781119692324" rel="nofollow">Trust in Computer Systems and the Cloud</a></em>!</p>

<ul>
<li>Check out <a href="https://dgshow.org/guests/mbursell" rel="nofollow">Mike Bursell</a> and <a href="https://dgshow.org/guests/nmccallum" rel="nofollow">Nathaniel McCallum</a> on <a href="https://dgshow.org/237" rel="nofollow">episode 237</a>!</li>
<li><em><a href="https://www.wiley.com/en-us/Trust+in+Computer+Systems+and+the+Cloud-p-9781119692324" rel="nofollow">Trust in Computer Systems and the Cloud</a></em> by Mike Bursell</li>
<li><a href="https://www.profian.com/" rel="nofollow">Profian</a></li>
<li><a href="https://defcon.org/" rel="nofollow">Defcon</a></li>
<li><a href="https://en.wikipedia.org/wiki/Blockchain" rel="nofollow">Blockchain</a></li>
<li><a href="https://en.wikipedia.org/wiki/Zero_trust_security_model" rel="nofollow">Zero Trust</a>: Poorly named? Would Explicit Trust be more accurate?</li>
<li><a href="http://www.ece.cmu.edu/%7Eganger/712.fall02/papers/p761-thompson.pdf" rel="nofollow">Reflections on Trusting Trust</a> by <a href="https://en.wikipedia.org/wiki/Ken_Thompson" rel="nofollow">Ken Thompson</a> </li>
<li><a href="https://en.wikipedia.org/wiki/Trusted_Platform_Module" rel="nofollow">Trusted Platform Module (TPM)</a></li>
<li><a href="https://en.wikipedia.org/wiki/Hardware_security_module" rel="nofollow">Hardware Security Module (HSM)</a></li>
<li><a href="https://en.wikipedia.org/wiki/Trusted_execution_environment" rel="nofollow">Trusted Execution Environment (TEE)</a></li>
<li><a href="https://en.wikipedia.org/wiki/Trusted_Computing" rel="nofollow">Trusted computing</a></li>
<li><a href="https://aliceevebob.com/2019/12/03/confidential-computing-the-new-https/" rel="nofollow">Confidential computing – the new HTTPS?</a></li>
<li><a href="https://enarx.dev/" rel="nofollow">Enarx</a></li>
<li><a href="https://en.wikipedia.org/wiki/Idris_Elba" rel="nofollow">Idris Elba</a></li>
<li><a href="https://en.wikipedia.org/wiki/Horrible_Histories_(2001_TV_series)" rel="nofollow">Horrible Histories</a></li>
</ul>

<p><strong>We Give Thanks</strong></p>

<ul>
<li><a href="https://dgshow.org/guests/mbursell" rel="nofollow">Mike Bursell</a>, for joining us on the show!</li>
</ul><p>Special Guest: Mike Bursell.</p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week Dave talks with <a href="https://dgshow.org/guests/mbursell" rel="nofollow">Mike Bursell</a> about his new book, <em><a href="https://www.wiley.com/en-us/Trust+in+Computer+Systems+and+the+Cloud-p-9781119692324" rel="nofollow">Trust in Computer Systems and the Cloud</a></em>!</p>

<ul>
<li>Check out <a href="https://dgshow.org/guests/mbursell" rel="nofollow">Mike Bursell</a> and <a href="https://dgshow.org/guests/nmccallum" rel="nofollow">Nathaniel McCallum</a> on <a href="https://dgshow.org/237" rel="nofollow">episode 237</a>!</li>
<li><em><a href="https://www.wiley.com/en-us/Trust+in+Computer+Systems+and+the+Cloud-p-9781119692324" rel="nofollow">Trust in Computer Systems and the Cloud</a></em> by Mike Bursell</li>
<li><a href="https://www.profian.com/" rel="nofollow">Profian</a></li>
<li><a href="https://defcon.org/" rel="nofollow">Defcon</a></li>
<li><a href="https://en.wikipedia.org/wiki/Blockchain" rel="nofollow">Blockchain</a></li>
<li><a href="https://en.wikipedia.org/wiki/Zero_trust_security_model" rel="nofollow">Zero Trust</a>: Poorly named? Would Explicit Trust be more accurate?</li>
<li><a href="http://www.ece.cmu.edu/%7Eganger/712.fall02/papers/p761-thompson.pdf" rel="nofollow">Reflections on Trusting Trust</a> by <a href="https://en.wikipedia.org/wiki/Ken_Thompson" rel="nofollow">Ken Thompson</a> </li>
<li><a href="https://en.wikipedia.org/wiki/Trusted_Platform_Module" rel="nofollow">Trusted Platform Module (TPM)</a></li>
<li><a href="https://en.wikipedia.org/wiki/Hardware_security_module" rel="nofollow">Hardware Security Module (HSM)</a></li>
<li><a href="https://en.wikipedia.org/wiki/Trusted_execution_environment" rel="nofollow">Trusted Execution Environment (TEE)</a></li>
<li><a href="https://en.wikipedia.org/wiki/Trusted_Computing" rel="nofollow">Trusted computing</a></li>
<li><a href="https://aliceevebob.com/2019/12/03/confidential-computing-the-new-https/" rel="nofollow">Confidential computing – the new HTTPS?</a></li>
<li><a href="https://enarx.dev/" rel="nofollow">Enarx</a></li>
<li><a href="https://en.wikipedia.org/wiki/Idris_Elba" rel="nofollow">Idris Elba</a></li>
<li><a href="https://en.wikipedia.org/wiki/Horrible_Histories_(2001_TV_series)" rel="nofollow">Horrible Histories</a></li>
</ul>

<p><strong>We Give Thanks</strong></p>

<ul>
<li><a href="https://dgshow.org/guests/mbursell" rel="nofollow">Mike Bursell</a>, for joining us on the show!</li>
</ul><p>Special Guest: Mike Bursell.</p>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 235: The Cult of the Dead Fruit on the Back of the Computer</title>
  <link>https://dgshow.org/235</link>
  <guid isPermaLink="false">f32b892c-399d-410c-a22b-d537aefdd333</guid>
  <pubDate>Thu, 19 May 2022 06:00:00 -0500</pubDate>
  <author>David Egts &amp; Gunnar Hellekson</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/1b67eddd-d80f-444d-ba32-aa9ef36b589d/f32b892c-399d-410c-a22b-d537aefdd333.mp3" length="37720578" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>David Egts &amp; Gunnar Hellekson</itunes:author>
  <itunes:subtitle>This week Dave and Gunnar talk with Dan Walsh about his new crayon-free book Podman in Action!</itunes:subtitle>
  <itunes:duration>52:23</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/1/1b67eddd-d80f-444d-ba32-aa9ef36b589d/episodes/f/f32b892c-399d-410c-a22b-d537aefdd333/cover.jpg?v=1"/>
  <description>This week Dave (https://dgshow.org/hosts/dave) and Gunnar (https://dgshow.org/hosts/gunnar) talk with Dan Walsh (https://dgshow.org/guests/dan) about his new crayon-free book Podman in Action!
The Container Commandos Coloring Book (https://developers.redhat.com/e-books/container-commandos-coloring-book)
Podman (https://podman.io/)
Podman in Action (https://www.manning.com/books/podman-in-action) by Dan Walsh!
Docker (https://www.docker.com/)
systemd (https://systemd.io/)
Kubernetes (https://systemd.io/)
OpenShift (https://www.redhat.com/en/technologies/cloud-computing/openshift)
Get started with RHEL for Edge (https://www.redhat.com/en/blog/get-started-rhel-edge)
rpm-ostree (https://coreos.github.io/rpm-ostree/)
podman-machine (https://docs.podman.io/en/latest/markdown/podman-machine.1.html)
Docker Desktop (https://www.docker.com/products/docker-desktop/)
Podman Desktop (https://podman-desktop.io/)
What Is Confidential Computing? (https://spectrum.ieee.org/what-is-confidential-computing)
virtiofs (https://virtio-fs.gitlab.io/)
podman-tui (https://github.com/containers/podman-tui)
SCaLE 19x (https://www.socallinuxexpo.org/scale/19x)
Red Hat Summit (https://www.redhat.com/en/summit)
Flatpak (https://www.flatpak.org/)
Fedora Silverblue (https://silverblue.fedoraproject.org/)
Toolbx (https://containertoolbx.org/)
Singularity (https://github.com/sylabs/singularity)
We Give Thanks
Dan Walsh (https://dgshow.org/guests/dan) for being our special guest star! Special Guest: Dan Walsh.
</description>
  <itunes:keywords>Container Commandos, coloring books, Podman, Podman in Action, Docker, systemd, Kubernetes, OpenShift, RHEL, Red Hat Enterprise Linux, Edge, RHEL for Edge, rpm-ostree, podman-machine, Docker Desktop, Podman Desktop, confidential computing, virtiofs, podman-tui, SCaLE, Red Hat Summit, Flatpak, Fedora Silverblue, Silverblue, Toolbx, Singularity</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week <a href="https://dgshow.org/hosts/dave" rel="nofollow">Dave</a> and <a href="https://dgshow.org/hosts/gunnar" rel="nofollow">Gunnar</a> talk with <a href="https://dgshow.org/guests/dan" rel="nofollow">Dan Walsh</a> about his new crayon-free book <em>Podman in Action</em>!</p>

<ul>
<li><a href="https://developers.redhat.com/e-books/container-commandos-coloring-book" rel="nofollow">The Container Commandos Coloring Book</a></li>
<li><a href="https://podman.io/" rel="nofollow">Podman</a></li>
<li><em><a href="https://www.manning.com/books/podman-in-action" rel="nofollow">Podman in Action</a></em> by Dan Walsh!</li>
<li><a href="https://www.docker.com/" rel="nofollow">Docker</a></li>
<li><a href="https://systemd.io/" rel="nofollow">systemd</a></li>
<li><a href="https://systemd.io/" rel="nofollow">Kubernetes</a></li>
<li><a href="https://www.redhat.com/en/technologies/cloud-computing/openshift" rel="nofollow">OpenShift</a></li>
<li><a href="https://www.redhat.com/en/blog/get-started-rhel-edge" rel="nofollow">Get started with RHEL for Edge</a></li>
<li><a href="https://coreos.github.io/rpm-ostree/" rel="nofollow">rpm-ostree</a></li>
<li><a href="https://docs.podman.io/en/latest/markdown/podman-machine.1.html" rel="nofollow">podman-machine</a></li>
<li><a href="https://www.docker.com/products/docker-desktop/" rel="nofollow">Docker Desktop</a></li>
<li><a href="https://podman-desktop.io/" rel="nofollow">Podman Desktop</a></li>
<li><a href="https://spectrum.ieee.org/what-is-confidential-computing" rel="nofollow">What Is Confidential Computing?</a></li>
<li><a href="https://virtio-fs.gitlab.io/" rel="nofollow">virtiofs</a></li>
<li><a href="https://github.com/containers/podman-tui" rel="nofollow">podman-tui</a></li>
<li><a href="https://www.socallinuxexpo.org/scale/19x" rel="nofollow">SCaLE 19x</a></li>
<li><a href="https://www.redhat.com/en/summit" rel="nofollow">Red Hat Summit</a></li>
<li><a href="https://www.flatpak.org/" rel="nofollow">Flatpak</a></li>
<li><a href="https://silverblue.fedoraproject.org/" rel="nofollow">Fedora Silverblue</a></li>
<li><a href="https://containertoolbx.org/" rel="nofollow">Toolbx</a></li>
<li><a href="https://github.com/sylabs/singularity" rel="nofollow">Singularity</a></li>
</ul>

<p><strong>We Give Thanks</strong></p>

<ul>
<li><a href="https://dgshow.org/guests/dan" rel="nofollow">Dan Walsh</a> for being our special guest star!</li>
</ul><p>Special Guest: Dan Walsh.</p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week <a href="https://dgshow.org/hosts/dave" rel="nofollow">Dave</a> and <a href="https://dgshow.org/hosts/gunnar" rel="nofollow">Gunnar</a> talk with <a href="https://dgshow.org/guests/dan" rel="nofollow">Dan Walsh</a> about his new crayon-free book <em>Podman in Action</em>!</p>

<ul>
<li><a href="https://developers.redhat.com/e-books/container-commandos-coloring-book" rel="nofollow">The Container Commandos Coloring Book</a></li>
<li><a href="https://podman.io/" rel="nofollow">Podman</a></li>
<li><em><a href="https://www.manning.com/books/podman-in-action" rel="nofollow">Podman in Action</a></em> by Dan Walsh!</li>
<li><a href="https://www.docker.com/" rel="nofollow">Docker</a></li>
<li><a href="https://systemd.io/" rel="nofollow">systemd</a></li>
<li><a href="https://systemd.io/" rel="nofollow">Kubernetes</a></li>
<li><a href="https://www.redhat.com/en/technologies/cloud-computing/openshift" rel="nofollow">OpenShift</a></li>
<li><a href="https://www.redhat.com/en/blog/get-started-rhel-edge" rel="nofollow">Get started with RHEL for Edge</a></li>
<li><a href="https://coreos.github.io/rpm-ostree/" rel="nofollow">rpm-ostree</a></li>
<li><a href="https://docs.podman.io/en/latest/markdown/podman-machine.1.html" rel="nofollow">podman-machine</a></li>
<li><a href="https://www.docker.com/products/docker-desktop/" rel="nofollow">Docker Desktop</a></li>
<li><a href="https://podman-desktop.io/" rel="nofollow">Podman Desktop</a></li>
<li><a href="https://spectrum.ieee.org/what-is-confidential-computing" rel="nofollow">What Is Confidential Computing?</a></li>
<li><a href="https://virtio-fs.gitlab.io/" rel="nofollow">virtiofs</a></li>
<li><a href="https://github.com/containers/podman-tui" rel="nofollow">podman-tui</a></li>
<li><a href="https://www.socallinuxexpo.org/scale/19x" rel="nofollow">SCaLE 19x</a></li>
<li><a href="https://www.redhat.com/en/summit" rel="nofollow">Red Hat Summit</a></li>
<li><a href="https://www.flatpak.org/" rel="nofollow">Flatpak</a></li>
<li><a href="https://silverblue.fedoraproject.org/" rel="nofollow">Fedora Silverblue</a></li>
<li><a href="https://containertoolbx.org/" rel="nofollow">Toolbx</a></li>
<li><a href="https://github.com/sylabs/singularity" rel="nofollow">Singularity</a></li>
</ul>

<p><strong>We Give Thanks</strong></p>

<ul>
<li><a href="https://dgshow.org/guests/dan" rel="nofollow">Dan Walsh</a> for being our special guest star!</li>
</ul><p>Special Guest: Dan Walsh.</p>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 201: Trust Issues</title>
  <link>https://dgshow.org/201</link>
  <guid isPermaLink="false">dc0a5d29-3905-4aef-8948-2ab51580a946</guid>
  <pubDate>Mon, 27 Jul 2020 07:00:00 -0500</pubDate>
  <author>David Egts &amp; Gunnar Hellekson</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/1b67eddd-d80f-444d-ba32-aa9ef36b589d/dc0a5d29-3905-4aef-8948-2ab51580a946.mp3" length="13310663" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>David Egts &amp; Gunnar Hellekson</itunes:author>
  <itunes:subtitle>This week Dave talks with Mike Bursell about how he handles his trust issues with Enarx!</itunes:subtitle>
  <itunes:duration>27:43</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/1/1b67eddd-d80f-444d-ba32-aa9ef36b589d/episodes/d/dc0a5d29-3905-4aef-8948-2ab51580a946/cover.jpg?v=2"/>
  <description>This week Dave (https://twitter.com/davidegts) talks with Mike Bursell (https://twitter.com/mikecamel) about how he handles his trust issues with Enarx!
  Enarx (https://enarx.io/)
  Trusted Execution Environment (TEE) (https://en.wikipedia.org/wiki/Trusted_execution_environment)
  Trust No One, Run Everywhere–Introducing Enarx (https://next.redhat.com/2019/08/16/trust-no-one-run-everywhere-introducing-enarx/)
  Announcing Enarx for running sensitive workloads (https://opensource.com/article/19/5/enarx-security)
  Enarx - project maturity update (https://next.redhat.com/2020/07/01/enarx-project-maturity-update/)
  Enarx news: WebAssembly + SGX (http://aliceevebob.com/2020/07/07/enarx-news-webassembly-sgx/)
  Follow @enarxproject (https://twitter.com/enarxproject) on Twitter
  https://confidentialcomputing.io (https://confidentialcomputing.io) 
We Give Thanks
*   Mike Bursell (https://twitter.com/mikecamel) for being our special guest star! Special Guest: Mike Bursell.
</description>
  <itunes:keywords>Enarx, trusted execution environment, TEE, confidential computing</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week <a href="https://twitter.com/davidegts" rel="nofollow">Dave</a> talks with <a href="https://twitter.com/mikecamel" rel="nofollow">Mike Bursell</a> about how he handles his trust issues with Enarx!</p>

<ul>
<li>  <a href="https://enarx.io/" rel="nofollow">Enarx</a></li>
<li>  <a href="https://en.wikipedia.org/wiki/Trusted_execution_environment" rel="nofollow">Trusted Execution Environment (TEE)</a></li>
<li>  <a href="https://next.redhat.com/2019/08/16/trust-no-one-run-everywhere-introducing-enarx/" rel="nofollow">Trust No One, Run Everywhere–Introducing Enarx</a></li>
<li>  <a href="https://opensource.com/article/19/5/enarx-security" rel="nofollow">Announcing Enarx for running sensitive workloads</a></li>
<li>  <a href="https://next.redhat.com/2020/07/01/enarx-project-maturity-update/" rel="nofollow">Enarx - project maturity update</a></li>
<li>  <a href="http://aliceevebob.com/2020/07/07/enarx-news-webassembly-sgx/" rel="nofollow">Enarx news: WebAssembly + SGX</a></li>
<li>  Follow <a href="https://twitter.com/enarxproject" rel="nofollow">@enarxproject</a> on Twitter</li>
<li>  <a href="https://confidentialcomputing.io" rel="nofollow">https://confidentialcomputing.io</a> </li>
</ul>

<p><strong>We Give Thanks</strong></p>

<ul>
<li>  <a href="https://twitter.com/mikecamel" rel="nofollow">Mike Bursell</a> for being our special guest star!</li>
</ul><p>Special Guest: Mike Bursell.</p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week <a href="https://twitter.com/davidegts" rel="nofollow">Dave</a> talks with <a href="https://twitter.com/mikecamel" rel="nofollow">Mike Bursell</a> about how he handles his trust issues with Enarx!</p>

<ul>
<li>  <a href="https://enarx.io/" rel="nofollow">Enarx</a></li>
<li>  <a href="https://en.wikipedia.org/wiki/Trusted_execution_environment" rel="nofollow">Trusted Execution Environment (TEE)</a></li>
<li>  <a href="https://next.redhat.com/2019/08/16/trust-no-one-run-everywhere-introducing-enarx/" rel="nofollow">Trust No One, Run Everywhere–Introducing Enarx</a></li>
<li>  <a href="https://opensource.com/article/19/5/enarx-security" rel="nofollow">Announcing Enarx for running sensitive workloads</a></li>
<li>  <a href="https://next.redhat.com/2020/07/01/enarx-project-maturity-update/" rel="nofollow">Enarx - project maturity update</a></li>
<li>  <a href="http://aliceevebob.com/2020/07/07/enarx-news-webassembly-sgx/" rel="nofollow">Enarx news: WebAssembly + SGX</a></li>
<li>  Follow <a href="https://twitter.com/enarxproject" rel="nofollow">@enarxproject</a> on Twitter</li>
<li>  <a href="https://confidentialcomputing.io" rel="nofollow">https://confidentialcomputing.io</a> </li>
</ul>

<p><strong>We Give Thanks</strong></p>

<ul>
<li>  <a href="https://twitter.com/mikecamel" rel="nofollow">Mike Bursell</a> for being our special guest star!</li>
</ul><p>Special Guest: Mike Bursell.</p>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
