 Sebastian, you're up next for a lightning talk. So hi, I'm Sebastian and I'm here to talk about Confidential Cloud Computing and NextCloud. And I think this is a perfect marriage. I have actually two hats on. On one hand, I'm a professor for cryptography and information security at Flensburg University and on the other hand, I'm the founder of Enclave, which pioneers confidential computer technology. And I'm really, really happy to say that after, I think, years of discussion, our university finally switched to NextCloud. But the truth is, and this is something which I can completely concur with what Lea figured out, it was actually a bit pain of the ass in order to convince IT people to just use NextCloud. Because, you know, standard questions like, ooh, what about security? Right? They asked me. What about data privacy? They asked me again. Then, who takes over the hosting? Can we, you know, take a third party provider, even a cloud provider that does it? Should we do it on our own IT? Discussions are discussions and this means, you know, in language, you know, of academia, a lot of meetings, no decision, you know, and literally it feels like a decade, right? So I have somehow the memory that we started the discussions 10 years before Corona and I think recently we closed them. It feels like that. And this is, I think, the situation with, you know, a lot of, say, public, with a public sector, with a government, you know, they care about and they make slow decisions. So one of the reasons why, you know, I dived into confidential cloud computing because I believe this is finally a great answer to all those problems I mentioned before. And confidential cloud computing, in a nutshell, it's like magic. You know, it turns us engineers into magicians because finally we can do something what only magicians can do. You know, you know, those magicians, those guys with a hat that, you know, put, for example, a dove in it and then pull out a rabbit, right? And something magically happens in that. And this is exactly how confidential computing works. This is more a technical slide, but in a nutshell you can think of that we can finally run any application in a fully memory encrypted way. This is the magic. And the nice result about that is that finally we can put any application, any container into a black box and deploy it in a cloud. And by black box I really mean that you can execute it. It works like any standard container, you know, you can manage it like any standard container with the extra superpower that once the container is deployed in the cloud or wherever you want to deploy it, it runs fully memory encrypted. So no one really sees what happens inside the container. And this is the magic. This is why I think this is a technology that in particular next cloud community should think about because it's like an enabling technology to have security by design, privacy by design, and solve, you know, all the nagging problems, you know, I mentioned some minutes ago. So the nice thing, just in order to conclude this, finally we can containerize our applications and literally run them anywhere on premise, private public clouds, who cares? Because the black box is simply saving the security and privacy of that app. And this way, of course, we can reduce security expenses. And as we figured out in Leah's observation, costs are definitely an important decision factor. For people in order to either switch to next cloud or not. Same holds for compliance, right? All the nagging about data security, can we use the cloud, blah, blah, blah, blah, right? This can also be addressed with confidential compute. Yeah, security expenses I had. So I know that's just lightning talk and I really have to speed up. But there is something I think you guys should see, namely the magic happen. So I brought a short live demo where we're going to just execute a Redis database, just a small, you know, container. And we're just going to create a database in that Redis database and simply do a memory dump and we're going to see that standard memory dump leaks the entries. A confidential memory dump doesn't do. And this happens while the database is in use. This is the novelty. It's not like static database encryption. It's really like it works. And whenever you want to do the dump, still the result is fully memory encrypted. And now I hope the technology works. Yeah. So Redis, the memory database, and we're going to create two containers. One, a standard Redis version. We call it the vanilla. You're going to see on the bottom right, you know, the access to the database. And on the bottom left, we have a confidential compute version out of that. Yeah. And as mentioned before, we're just going to write into the database and then do a memory dump. And so, yeah. So this is the Docker compose in order to create the two containers. The whole starting, launching, like a standard container, no changes, no big difference. And, yeah. Now we're going to send my secret. It's a key value pair which we generated. And let's search for the process ID of Redis. We got it. And now with Gcore, it's part of GDB, we made a memory dump. Yeah. And with Grap, we now search for the key value of my secret and there is a match. Yeah. Why? Yeah. Standard use. And on the left, we now repeat the same procedure. So we wrote my secret into the database. We're searching for the process ID, make a memory dump. Oh, no. Okay. Memory dump made projector and search for the string and there was no match because the whole memory dump is encrypted. That's the magic. Yeah. Boo. All right. So if you guys are interested in exploring that new technology, something you should know is that all major cloud providers and even hosting providers like OVH offer either virtual machines or dedicated machines which enable it to run you those confidential containers. We created the base in our GitHub repository which covers 18 basic open source confidential compute versions of standard applications like MongoDB, MariaDB. You can PHP, Python, whatever you want. So just in order to have a confidential compute version of your container application. So try it out, play around with that, give us feedback and maybe this is the answer to solving all those nagging problems, how security and privacy by design applications can be developed. All right. Thank you. Sebastian, thank you so much. It was my pleasure. Pleasure to have you with us. All right.