THE SINGLE BEST STRATEGY TO USE FOR CONFIDENTIAL COMPUTING ENCLAVE