Confidential-computing

Daniel Huynh
Members Public

Discover Confidential Computing by Coding Your Own KMS Inside an Enclave

Discover confidential computing with our tutorials. Fill the knowledge gap, become proficient in secure enclaves, and craft applications with their strengths. Join us to become a Confidential Computing wizard! Dive into our content and start your journey today.

Raphaël Millet
Members Public

Mithril X Tramscribe: Confidential LLMs for Medical Voice Notes Analysis

How we partnered with Tramscribe to leverage LLMs deal with Medical voice notes analysis

Corentin Lauverjat
Members Public

BlindAI Passes an Independent Security Audit by Quarkslab

We take security and open-source data privacy seriously at Mithril Security. So we're very proud that our historical confidential computing solution, BlindAI, was successfully audited by Quarkslab!

Raphaël Millet
Members Public

Mithril x Avian: Zero Trust Digital Forensics and eDiscovery

How we partnered with Avian to deploy sensitive Forensic services thanks to Zero Trust Elastic search.

Daniel Huynh
Members Public

Data Science: The Short Guide to Privacy Technologies

If you’re wondering what the benefits and weaknesses of differential privacy, confidential computing, federated learning, etc are, and how they can be combined to improve artificial intelligence and data privacy, you’ve come to the right place.

Daniel Huynh
Members Public

Mithril Security Joins the Confidential Computing Consortium

Mithril Security joins the Confidential Computing Consortium to accelerate open-source privacy friendly AI

Daniel Huynh
Members Public

Presenting Mithril Cloud, the First Confidential AI as a Service Offering

Discover how BlindAI Cloud enables you to deploy and query AI models with privacy, just from 2 lines of Python code. Try our solution with the deployment of a ResNet model.

Daniel Huynh
Members Public

Confidential Computing Explained. Part 3: Data In Use Protection

Deep dive into the data-in-use protection mechanisms of secure enclaves

Daniel Huynh
Members Public

Confidential Computing Explained. Part 2 : Attestation

An introduction to remote attestation, which is the key to trust a remote enclave.

Daniel Huynh
Members Public

Confidential Computing Explained. Part 1: Introduction

An introduction to Confidential Computing and the problems it solves