Skip to main content

Build with Confidential VMs

Confidential Virtual Machines (CVMs) enable secure and private computation in untrusted environments. By leveraging hardware-based encryption and secure enclaves, CVMs ensure that your sensitive data and applications remain protected even when running on third-party infrastructure. With Oyster's CVM tooling, you can create secure environments that maintain data privacy while still allowing for complex computations and operations.

Getting started

Users who wish to build and deploy Confidential VMs should start with the tutorials to gain a basic understanding of what the Oyster platform offers and how to interact with it.

If you're feeling adventurous or just want to get a taste of what deploying an Oyster CVM looks like, head straight to the quickstart ;)

Core concepts

Learn about the concepts at the heart of Oyster CVMs and how to wield them effectively.

Guides

Follow these guides to accomplish specific tasks. Most guides assume a baseline knowledge of the Oyster platform that you can gain through the tutorials.

Examples

Here are some examples that solve real-world problems that you can use as a reference for your own applications:

Explore the protocol

Oyster is not just a compute environment, but a decentralized protocol! Explore the design of the protocol and the decisions that make Oyster CVMs what it is today.