Furthermore, privacy-preserving technologies, such as Trusted Execution Environments (TEEs), confidential computing, secure ...