Confidential AI - An Overview
Transparency. All artifacts that govern or have access to prompts and completions are recorded on the tamper-proof, verifiable transparency ledger. External auditors can assessment any version of these artifacts and report any vulnerability to our Microsoft Bug Bounty program. With confidential computing, enterprises acquire assurance that genera