Introducing generalized verifiable compute What if the software running your systems isn’t what you think? If you had to prove what software is on a system, how would you do it?