A journey into the realm of VM-based Confidential Computing technology, and how we secured the guest's early boot phase.