Fig. 2 shows the 2nd embodiment in the creation. in its place for the P2P configuration explained before, the second embodiment or maybe the centrally brokered process comprises a central server unit (also referred to https://lawsonrduj847741.blogdeazar.com/29984727/everything-about-data-loss-prevention-confidential-computing-tee-confidential-computing-enclave-safe-ai-act-confidential-ai-data-security-data-confidentiality