$ 0 0 So-called confidential computing approaches allow data to remain encrypted while in use - that's best done in hardware.