Increasing Trust in Confidential Computing