after we start non-public Cloud Compute, we’ll take the extraordinary step of creating software visuals of every production Develop of PCC publicly available for security investigation. This promise, way too, is really an enforceable promise: user units will be willing to send details only to PCC nodes that can cryptographically attest to operati