<img width="578" height="341" src="https://venturebeat.com/wp-content/uploads/2016/05/encryption-key.jpg?fit=578%2C341&strip=all" alt="encryption key" loading="lazy" srcset="https://venturebeat.com/wp-content/uploads/2016/05/encryption-key.jpg?w=1440&strip=all 1440w, https://venturebeat.com/wp-content/uploads/2016/05/encryption-key.jpg?w=300&strip=all 300w, https://venturebeat.com/wp-content/uploads/2016/05/encryption-key.jpg?w=768&strip=all 768w, https://venturebeat.com/wp-content/uploads/2016/05/encryption-key.jpg?w=800&strip=all 800w, https://venturebeat.com/wp-content/uploads/2016/05/encryption-key.jpg?w=400&strip=all 400w, https://venturebeat.com/wp-content/uploads/2016/05/encryption-key.jpg?w=750&strip=all 750w, https://venturebeat.com/wp-content/uploads/2016/05/encryption-key.jpg?w=578&strip=all 578w, https://venturebeat.com/wp-content/uploads/2016/05/encryption-key.jpg?w=930&strip=all 930w" sizes="(max-width: 578px) 100vw, 578px">Blending hardware enclaves with cryptography, Raluca Popa developed a practical solution for confidential computing.<a href="https://venturebeat.com/security/confidential-computing-provides-revolutionary-data-encryption-uc-berkeley-professor-says/" target="_blank">Read More</a>