In the first part of our exploration into verifiable confidential computing, we delved into the intricacies of this technology. Now in this part, we turn our attention to the reasons behind the Humanode team’s decision to embrace confidential computing, its advantages plus flaws, and how we plan to deal