The three levels of confidential computing – what do they protect? | Dark Hacker News