Can crypto thefts be prevented by confidential computing?