{"version":"1.0","provider_name":"Microsoft Azure Blog","provider_url":"https:\/\/azure.microsoft.com\/en-us\/blog","author_name":"Lachlan Evenson","author_url":"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/lachlan-evenson\/","title":"Bringing confidential computing to Kubernetes | Microsoft Azure Blog","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"ziGYumNrBm\"><a href=\"https:\/\/azure.microsoft.com\/en-us\/blog\/bringing-confidential-computing-to-kubernetes\/\">Bringing confidential computing to Kubernetes<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/azure.microsoft.com\/en-us\/blog\/bringing-confidential-computing-to-kubernetes\/embed\/#?secret=ziGYumNrBm\" width=\"600\" height=\"338\" title=\"&#8220;Bringing confidential computing to Kubernetes&#8221; &#8212; Microsoft Azure Blog\" data-secret=\"ziGYumNrBm\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","description":"Confidentiality of your data and your code is critical in computing. In the ephemeral world of container orchestration, we need even more attention to protecting data. Ensuring confidentiality at rest and in flight is difficult enough; until now, it has been even harder to ensure that your data is protected during processing.","thumbnail_url":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2019\/11\/0ca1067e-4f66-40d3-a5eb-f6d8fb5b6012.webp"}