5 SIMPLE STATEMENTS ABOUT CONFIDENTIAL COMPUTING ENCLAVE EXPLAINED