Frog is holding a box (presumably filled with cookies) as he converses with Toad. Frog ran the inferencing in Private Cloud Compute. “There,” he said. “Now we can cryptographically attest that we do not see the request.” “But you control the hardware root of trust,” said Toad. “That is true,” said Frog.
https://federated.saagarjha.com/media/bc455c3a-99df-4544-8261-8d8bc9e8f9e3/file.png