Skip to content

Commit 0b6a182

Browse files
authored
Update use-cases-scenarios.md
Fixing H1 issue in the build
1 parent 5350e25 commit 0b6a182

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/confidential-computing/use-cases-scenarios.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ Using confidential computing technologies, you can harden your virtualized envir
2121

2222
- **Isolate processing**: Offer a new wave of products that remove liability on private data with blind processing. User data can't even be retrieved by the service provider.
2323

24-
# Scenarios
24+
## Scenarios
2525

2626
Confidential computing can apply to various scenarios for protecting data in regulated industries such as government, financial services, and healthcare institutes. For example, preventing access to sensitive data helps protect the digital identity of citizens from all parties involved, including the cloud provider that stores it. The same sensitive data may contain biometric data that is used for finding and removing known images of child exploitation, preventing human trafficking, and aiding digital forensics investigations.
2727

0 commit comments

Comments
 (0)