39:19 Formal specification of attestation mechanisms in Confidential Computing – Muhammad Usama Sardar The Linux Foundation
26:14 Use case deep dive: Secure and privacy-preserving cyber threat intelligence exchange– Nicolae Paladi The Linux Foundation
32:37 Securing the Unseen: Vulnerability Research in Confidential Computing- Josh Eads The Linux Foundation
36:35 PETs of the world unite! Conquer the middle ground in the performance vs...– Dr. Sven Trieflinger The Linux Foundation