Describir: Practical Information Flow Control in Real-World Systems: Cryptography, Reference Monitor, and Confidential Computing