Enabling Trusted Compute in Untrusted Locations through the Use of Privacy Enhancing TechnologiesLinkedInTweetEmail