 Sounds good. Hello, everyone. Good morning. My name is Nick Vidal. I work for Anarchs. I'm the community manager of this open source project. I also work with Profion. And we're going to be talking about bootstrapping a community using mentorship. And this is a brief summary of what we will be covering. So I'll give a brief introduction to Conflation Computing about Anarchs, how it works. I'll talk about the mentorship programs and initiatives that exist. And I'll highlight each way that our mentees have helped our community around documentation, tutorials, codes, events. Also, we have a hack challenge that we created. And finally, we're going to have a conclusion. And after that, we're going to run a live demo. Let's see if that works. Oh, I need internet for that. So let's see. So let's start with a brief introduction. What's Anarchs? So Anarchs is an open source project. We're part of the Confederation Computing Consortium from the Linux Foundation. And Confederation Computing is a very new area. It's an emerging area with a very new community. Before explaining what's Confederation Computing, let's start explaining what are the three states of data protection. So we can protect data, arrests, intransit, and in use. Confederation Computing is about protecting data in use. This is a whole new area that is emerging. So what's protecting data arrests? If you have a laptop and you encrypt your hard drive, that's protecting data arrests. If your laptop gets lost, your data is protected because whoever stole your laptop, he can scan the whole hard drive and he'll not be able to make sense of the data. And the same is valid for the clouds. So if you upload adoptments in the clouds and that gets saved, that storage, if it's encrypted, again, if somebody gets access to that server and he or she tries to see that data, if it's encrypted, it's protected. We also have protection in transits. And that's when you open a browser, you enter HTTPS and you try to access websites. HTTPS is about protecting the flow of this data between your browser and the server. Also, when you're using instant messaging or any type of application that has end-to-end encryption, that data that is going back and forth is encrypted. Nobody in the middle who has access to this data will be able to see the data. And this is really important. So protection arrests is something that a lot of people use. It's very common in the clouds, of course. In transits, back a long time ago, only e-commerce websites use HTTPS. But with campaigns like Let's Encrypts, people really started using HTTPS by default. And this is really important. It really made the web more safe, more secure. And we hope to have the same impacts with confidential computing, protecting data in use. If people could default to that, that would be really great. So confidential computing protects data in use by performing a computation in a hardware-based, trusted execution environment, a TE. There are four ways that we can actually protect this data, so the data and the codes. So confidentiality of the data, integrity of the data, integrity of the codes, and also confidentiality of the codes, while this is not a requirement for confidential computing, Anarchs does provide this. And it's interesting. You can think about the, there's a phrase that we use at Anarchs. No peeking and no tweaking. That's how you can remember this. So no peeking means protecting the confidentiality. You can't peek into the data. And no tweaking. You can't mess up with the data or the codes, of course. So what are the uses for confidential computing? There are a lot of sectors that have a lot of sensitive data. They have not been able to use the cloud so far, because these sectors are very much regulated. And so we have like banking and finance, healthcare, government, public sector, customer data, telecommunications. Most sectors have very sensitive data. How can they take advantage of the clouds? If the server gets hacked, we hear this all the time on the news, and the data gets leaked, this is really problematic. And these are the main sectors where confidential computing plays, could play a really important role. So we brought in some mantis who had no idea what was confidential computing. This is very new. And we, in just a few months, they were able to learn a bit more about Anarchs, about confidential computing, and technologies that we use to achieve this. And this was really important. So we decided to create a fellowship program, a mentorship program, not just as part of Anarchs, but as part of the Confederation Computing Consortium from the Linux Foundation. So it was not just about our own projects. The Confederation Computing Consortium has six projects currently, one of them is Anarchs, and we wanted to have other projects to join us in this mentorship program. Right now, we're participating together with Veracruz, which is another project part of the CCC. And when creating a mentorship program, it's very challenging. I don't recommend creating one from zero. There are several initiatives that already exist, and you can take advantage of those. So we have LFX mentorship from the Linux Foundation. It works really great. We have a lot of interest there, people interested in learning about confidential computing. We have Google Summer of Codes as well. This is a program from Google to promote new members to learn about open source. And we have Outreachy, which is a fantastic program from the Software Freedom Conservancy. And we've been gaining a lot of very good individuals. It's a diversity initiative. So people from very different backgrounds, but they've been learning, and it was a really great experience for them to learn and to contribute to our projects. So one of the ways that our mantis have been helping us is around documentation. Documentation is really important for, especially for a very early community, because that's how they will learn, and that's how they will share it with others. So very early on, our community has helped to create a documentation, and I want to go back a bit around confidential computing and how that works. So we have several CPUs that provide confidential computing. We have Intel, AMD, ARM. And what's so challenging about this is that every single one of those CPUs, they have a way to implement confidential computing. And it's completely different. And Anarchs provides a thin layer that abstracts this complexity and allows you to take advantage of confidential computing. And we use something called WebAssembly for that. Most of you probably have heard of WebAssembly on the web, but WebAssembly also works in the clouds. So you can use whatever programming language you're familiar with, C, C++, Rust, Go, and use WebAssembly to compile that to an architecture, like Intel or AMD. And this is totally transparent, and it works really well. One of the challenges is that WebAssembly is also very new. So confidential computing is very new. WebAssembly for the cloud is also very new. The support for these different languages is not on par yet. It's in progress. So our mantis really played an important role in doing some research around each one of those different languages and seeing how that works with WebAssembly. So we have in our WebAssembly guide, we have about 13 languages. And so imagine having to do a research for each language and see how that works, how WebAssembly works for each language. And so our interns and mantis, they went around, they researched about this for each language. They created tutorials for each one, and they tested, if it was too complicated, they asked to help one from each other. And so this was really important for us. We also created several tutorials, and we created a community around this called WebAssembly Builders. And so WebAssembly Builders is made up by several organizations and several companies. We have Anarchs or open source projects. We have a few companies here who have joined, who helped to grow this community. And the Anarchs projects, the Anarchs interns have published over 100 tutorials at WebAssembly Builders. And over 1,000 people are on this community learning about WebAssembly and how several languages like Go, for example, how to make Go work with WebAssembly and Wasi. So this is really exciting. We started this community from scratch, and now we have a very healthy community there. And thanks to our mantis and other people who have published as well tutorials here. Our mantis have also helped to build demos and helped with codes. So Anarchs is quite interesting because our first release was just a few months ago, maybe six or seven months ago, and every time it's changing. We add a new feature, sometimes it breaks, and imagine you as a mentee working with this software. Every, very new, every time changing, it's not production waiting, and learning about this and all the new features. So, and this was really important for us, so two of our mantis, they helped us with implementing a TCP Echo server when we first provided support for networking. And what's interesting is that we have a very senior developer in our core team, Harold. He actually implemented the TCP Echo server and our mantis. They tested this to see how it works. And they found that, I wouldn't say it's a bug, but it was an assumption from Harold that it didn't quite work. An environment, it was a bit different. And so this was really interesting to see junior developers working together with someone very senior and they identified a problem and they worked together to develop something better. So mantis are really fantastic for helping to break down assumptions that we, as senior developers may have. And this is especially true for security. It's true for software communities in general and open source communities in general, but especially around security, open source projects. Because it's all about the assumptions that we have. And when we bring a diverse group together to analyze our codes, they can find these vulnerabilities that we haven't thought about before. We also had a mantis, she was very passionate about machine learning and about learning rusts. And so she built a demo around that. And another mantis that we had, she was very much into cybersecurity. She helped to create a demo, a fantastic demo here. You can see the illustration around zero knowledge proof. This is a way for you to, you kind of verify something without revealing any information. This is very much used in cryptography. And she built a very beautiful demo around that. Our mantis have also participated in events. So our founders, they present a lot of conferences, but they haven't presented yet in Africa and Asia. And since our mantis were from these regions, they helped us to reach those regions and to promote confidential computing and to promote anarchs there. So it was really interesting that we were at open source festival in Africa, FOSS Asia, which is one of the largest open source conferences in Asia. Also, it was nice to see our mantis presenting at the open confidential computing conference. This is the largest conference around confidential computing. And they were very junior, but at the same time they were sharing the stage with the CDO of Microsoft Azure. And to see this contrast, very junior developers presenting side by side with, like, the CDO of Azure, that's just fantastic. Also, one of her mantis recently, she was accepted, so Shradha, who built the zero knowledge proof demo, her work was accepted at the open source in finance forum. This is a conference we were never able to participate in. And we're working out the details of how she could travel. This is going to be an in-person event and how she could travel to this conference to participate. And so we have to work with the mantis. When we're speaking, everybody gets nervous, so we have to work with them on building this confidence in giving talks. And this is really great to see their growth. So this is one of the... It's nice because Anarchs is... Our logo is a shield. And every release that we have, it's around castles and forts. So that's our theme. So she created this theme as well for her presentations. So we have the dragons, like the bad guys trying to break your data, right? And yes, very nice. They have also helped us to create something that we call a hack challenge. And this was pretty exciting. I'm going to share a story in Nathaniel with you. So Nathaniel is one of the founders of Anarchs. He presented this demo just a month ago in Valencia, at KubeCon. And Harold and Richard, which are the most senior developers, they built a framework. And I built this application on top of that. And I'm also new to Rust. And I'm learning Rust. So I was having some issues, especially with the borough checker. Anybody who knows Rust knows about the borough checker. You're always fighting constantly with the borough checker. And I had one really hard time with one special thing, and I couldn't solve it. And so what happened is that after two days trying to solve this, I reached out to one of our community members, my young, who is more knowledgeable about Rust. And so he helped me, and he said, hey, this is how you can do this. You have to use ref cell, if I recall correctly, to pass this data as a parameter. So mentorship has been a two-way street. It's not just you as a mentor teaching your mentees, but also you learning from your mentees. And each one of those mentees working together, as peers, and learning from each other, creating tutorials, creating videos, creating demos, and sharing knowledge. So this is what's so special and so nice about a mentorship program. So crypto is a word of clone. So this is everyone's favorite word-gassing game. And what we did is we created a version where you can guess, just like Wordle, you can guess one secret word. There's a multiplayer version as well, where you try to guess other people's words. And there's a third way of playing this. So we are going to give you root access to the server and look at all the data, all the words that are being sent to the server. But since we're using confidential computing and since all the data is encrypted, you wouldn't be able to see that. So the challenge is if you can break into that, if you can break anarchs, if you can find an exploit and see those secret words, then you win the hack challenge. So we're going to play this game right after the presentation, and I think it will be fun. It was interesting because we got together with everyone of our mentees to promote this. So this design for the hack challenge was created by one of our mentees as well. Actually, there were several proposals, and we selected one of them. So everyone was working together. In fact, I'll be presenting. There's a large hack conference from Brazil. So there's a large hack conference happening three weeks from now. And the person, the mentee who created this design, Anna, she will also be there. And she will be presenting together this. So this is really great when we can bring everyone together. This will be an in-person conference. So it will be nice for her to participate there as well. So what are some conclusions that we can take from this? The goal of Anarchs and Mike and Nathaniel, since the very beginning, they wanted to make confidential computing accessible. Confidential computing is really complex. You have to know about cryptography. You have to know about attestation. For each CPU, you have a way of implementing this. It's really, really complex. And their goal was always how can we make this accessible? How can we, even junior developers, can pick this up and create applications they use confidential computing? So it was really important for us to have this mentorship program because the mentees help us validate this. And they're constantly helping us. We have these assumptions of what it's easy, what's accessible, and if they can, if the junior developers can develop this, hopefully the senior developers can also develop this. And this is really important. The mentees have really made a big impact in our community. They have helped us with documentation, with tutorials, codes, testing, building demos, helping us with events, virtual events, and right now real in-person events as well, with the Hack Challenge. So they have really played an important role for our very small and growing community. And hopefully we have also helped them. Helped them in their careers, not just professionally, to help them grow professionally, but also personally, as a person, learn about open source and collaboration. And they can say, hey, I was part of an emerging technology, confidential computing, actually too, and WebAssembly. So to be part of this, this is kind of like Kubernetes five years ago. We're there in the moment that this is starting. And to have those mentees working together with us and building this community from the start, I think it's a really special moment. And so I would like to acknowledge our mentees who have helped us in this, in growing our community, and invite you to join our community. So that's our website, nrx.dev. If you want to visit our GitHub page as well, if you want to give us a start, there will be greats. You can join our chats. And we have a fellowship guide. This is under Creative Commons. If you want to implement something similar in your open source community, please feel free to use this as well. And let's see how much time we have. Let's see if we can play again. So we're actually going to be playing crypto here. And so I need everyone's help right now. If you can get your phone, I hope Wi-Fi is working. Please get your phone here. And let me show you the URL. Crypto.dev if you can join this. I hope it's working. Sometimes this is not production waiting. Live downloads are always challenging, but let's see if it works. So I'll give you a brief explanation of how this works. So there are two ways to play this. So one way, it's a one player. It's just like Wordle. And we're going to do the multiplayer version. And here are the colors to help you. You're going to guess five letter words. And you can guess as many words as you want. Even if you fill out all the I believe there's six entries, you can start over. No problem. And we also have different colors. So the blue color is when you have a letter in the right spots for any words that have been sent. Purple means that you got a word correct that somebody else guessed. And red means that you guessed a word that was already a match before. So red is not valid. You want the purple ones. You want to guess other people's words. The third way is the hack challenge that I explained before. So let's try to play this game. But I'm going to help you. I'm going to help you with this. It's very challenging for you to think about those five letter words. Some of you have more practice on this because you've been playing Wordle for a long time. But I'm going to show you some slides. And these will give you some hints of what words you can select. Don't start from the beginning. You can start from the middle of the slides or the ends. Let's give it a try. Let's see if that works. So let me go back here to the slides. And I'll just read a summary of the whole session. And each slide will have those words, those five letter words. So let's give it a try. Let's see who can type really fast. You see slides is a five letter word. So you have to type this as fast as possible. If you get a red, it means somebody else already guessed that. There was already a match. So let's start. Each slide will contain hints and clues. Guess first the words that match to win. Be alert. Be quick. And be smart. And sharp. Lucky ones with a high score will win a prize. Everybody got this? Go ahead. Try type those words as fast as possible. If there's an issue with the website, give a refresh. You have to enter your Twitter handle so we can identify and see who is guessing those words. And all those words are being sent to the server. It's running on top of Anarchs. And when there's a match, you'll get a purple one. Okay? Next slide. Our mentorship program helps young women and all folks from diverse backgrounds to learn about open source. Linux and the cloud. To solve any issue on GitHub. To write their first hello world in Rust. And to build demos with WebAssembly, which just feels like magic. So we have a lot of five letter words here. Give it a try. Probably you're going to get a lot of reds because people are guessing all the time. But find your best strategy. Next up. We help mentees to create videos, to tell a story, to give talks at events, and to teach their peers in a virtual cycle. Or values are worth fighting for. We believe in providing trust. The clouds can be quite scary. Hosts can get phones. In an ideal world, what gets shared is a choice. The rest stays private. Chips from Intel, AMD, ARM offer Confidation Computing. Anarchs provides a thin layer that abstracts all the complexities. To achieve the next level in cybersecurity. Please join the Anarchs community. We're a friendly bunch. Check our GitHub. Twitter and LinkedIn pages. And give us stars and likes. Thank you. And keep Austin, Texas, weird. All right. So let's see. I hope it works. So let's go back here. Let's see if it works. All right. Wow. This is a lot. So these were the matches. Every one of these words was a match. So the winner was no. Oh, yeah. We can raise your hand, please. Oh, so maybe it was you. Yeah. But who guessed all those words here? 25 points. That explains, yeah. I see it. So I see it. You didn't put your hands up. You didn't put your hands up. You didn't put your hands up. I see. You didn't put your handle because you wanted to keep your data private, right? You don't want to share your trigger handle. Oh, I see. Oh, and Matt, you won again. Yeah, you're fantastic. So you got 11 points. And it's tied with... So Mike, what happened here? So you have 11 points here. You have two points here. Yeah. Okay. I guess we have a tie here. So I hope you had fun. This was able... This was possible because of her mantis. They were able to help us to implement this. We have some t-shirts for the winners. I'm guessing people will fight to see who are the winners. But anyways, our mentorship program has been really helpful. And I would like to thank our mantis. I would like to thank Mike and Fanny for supporting us in this initiative. And thank you everyone for playing and having fun. All right. Do we have time for any questions? So I don't think we have some time. If anybody wants to ask about mentorship, also about anarchs and confidential computing, please feel free to do so. And yes, go ahead, please. Yes, that's a very good question. So the question is, she said that she saw, she sees how we were able to find mantis, right? But how is the mentor selection process? So for anarchs, we have a very small team actually of developers. And mentoring requires some time, right? Some dedication. And it's very challenging. So for us, I've been acting as a mentor. But we have also, we talked with our mantis. And they always approach other members of the community, the core team, to ask any questions. So you could see the collaboration between Dipanshu, for example, while with Harold, which is the most senior developer. This is a challenge. We should embrace more, right? We should work together with our core team and help them to work together with the mantis. We also have another project, Veracruz. And they have made available actually three mentors for their open source projects. We are also trying to find mantis, sorry, mantis from other communities, not just from anarchs. So if anybody is available and wants to contribute and become a mentor, you don't have to know about confidential computing or anarchs. This is actually a nice opportunity for you to learn. But if you want to become a mentor to help with documentation or even preparing for an event or a conference, this is a nice way to get together in this community. But that's a very good question. This is something that we have to work on. Yeah. Any other questions? So we have about five minutes. I hope you enjoyed the game. It was really fun. Sometimes it did crash. This is very experimental. This was implemented in Rust and compiled to WebAssembly and it's running on top of anarchs and we wanted to demonstrate confidential computing. So all this data here, when there's a match, we review this information to everyone and we made it public, right? But you can imagine this. All these secret words, they're caps in memory and they're only reviewed when there's a match. But if there's not a match, this data should remain private. So we wanted to create a fun game. So Word was like the most famous word-gassing game and yeah, I hope you enjoyed it. Continue playing. Thank you so much. Appreciate it. Yeah.