Don't Trust, Verify: Building End-to-End Confidential Applications on GCP | Dark Hacker News