• Menu
  • Skip to right header navigation
  • Skip to main content
  • Skip to primary sidebar

DigiBanker

Bringing you cutting-edge new technologies and disruptive financial innovations.

  • Home
  • Pricing
  • Features
    • Overview Of Features
    • Search
    • Favorites
  • Share!
  • Log In
  • Home
  • Pricing
  • Features
    • Overview Of Features
    • Search
    • Favorites
  • Share!
  • Log In

Startup Sentient’s new system for deploying AI applications in Trusted Execution Environments uses confidential computing to ensure full data isolation, verifiability and attestation

April 25, 2025 //  by Finnovate

Peter Thiel-backed AI development startup Sentient is looking to differentiate itself in terms of security with the launch of a new system for deploying AI applications in Trusted Execution Environments. The new Sentient Enclaves Framework v0.70 brings the concept of “confidential computing” to AI development. It’s meant to ensure full data isolation, verifiability and attestation for AI applications, the company said. It uses Amazon Web Services Inc.’s AWS Nitro Enclaves technology to ensure that neither AWA nor the host system is able to access or modify AI workloads. In that way, it says, it provides rock-solid guarantees around AI data security. The Sentient Enclaves use AWS Nitro as a foundation to ensure that applications run as intended, without any possibility of nefarious actors making unauthorized modifications. They’re fully open source too, meaning they’re accessible to anyone who’s interested in using them. With Sentient’s platform, developers can work together on the development of open-source large language models that rely on shared datasets and decentralized computing resources. Its platform is built on blockchain technology, and its ecosystem uses cryptocurrency to reward participants based on their contributions.

Read Article

Category: Members, Cybersecurity, Innovation Topics

Previous Post: « MoneyThumb’s AI enables the authentication of third-party PDF documents to analyze structural, metadata, and content-based patterns
Next Post: Automated code review platform Coana allows security teams to determine whether identified vulnerabilities in a codebase are actually exploitable by constructing detailed call graphs through static control-flow analysis »

Copyright © 2025 Finnovate Research · All Rights Reserved · Privacy Policy
Finnovate Research · Knyvett House · Watermans Business Park · The Causeway Staines · TW18 3BA · United Kingdom · About · Contact Us · Tel: +44-20-3070-0188

We use cookies to provide the best website experience for you. If you continue to use this site we will assume that you are happy with it.OkayPrivacy policy