The evolution of data elements is gathering momentum, and confidential computing is transitioning from the stage of technical verification to widespread commercial deployment. Nevertheless, the industry harbors certain misconceptions regarding it. In response, a collaborative effort involving 16 institutions from the industrial, academic, and research sectors has resulted in the release of the White Paper on Confidential Computing Technology, which clarifies five prevalent misunderstandings within the industry. Confidential computing guarantees that data remains accessible yet concealed during the computational process, with results encrypted, thus ensuring the security of the entire computational chain. One of the most widespread misconceptions is the belief that confidential computing is prohibitively expensive. Contrary to this, its performance is nearly on par with that of plaintext computation, and the costs have been substantially lowered thanks to innovations in technical architecture and infrastructure. It also boasts high compatibility. Confidential computing facilitates a shift in data circulation from reliance on 'entity trust' to 'technology trust,' with security measures spanning the entire chain. Presently, confidential computing has seen large-scale implementation across various domains, with leading industry entities working together to establish standards, open-source frameworks, and construct evaluation systems.