Mithril Security Blog
  • Website
  • GitHub
  • Documentation
  • Contact
Subscribe

confidential-computing

A collection of 7 posts
Build a privacy-by-design voice assistant with BlindAI
blindai

Build a privacy-by-design voice assistant with BlindAI

Discover how BlindAI can make AI voice assistant privacy-friendly!
May 24, 2022 — 7 min read
Introducing BlindAI, an open-source privacy-friendly AI deployment in Rust
blindai Featured

Introducing BlindAI, an open-source privacy-friendly AI deployment in Rust

Discover BlindAI, an open-source solution for privacy-friendly AI deployment in Rust!
May 12, 2022 — 5 min read
Confidential computing explained. Part 3: data in use protection
confidential-computing

Confidential computing explained. Part 3: data in use protection

Deep dive into the data-in-use protection mechanisms of secure enclaves
Mar 7, 2022 — 7 min read
Our roadmap at Mithril Security
roadmap

Our roadmap at Mithril Security

Our roadmap at Mithril Security to commoditize Confidential AI
Mar 1, 2022 — 3 min read
Deploy Transformers models with confidentiality
blindai Featured

Deploy Transformers models with confidentiality

Learn how to deploy Transformers models, with privacy guarantees thanks to Confidential Computing!
Feb 24, 2022 — 5 min read
Confidential computing explained. Part 2 : attestation
confidential-computing

Confidential computing explained. Part 2 : attestation

An introduction to remote attestation, which is the key to trust a remote enclave.
Feb 17, 2022 — 5 min read
Confidential computing explained. Part 1: introduction
introduction

Confidential computing explained. Part 1: introduction

An introduction to Confidential Computing and the problems it solves
Feb 13, 2022 — 6 min read
Mithril Security Blog © 2022
  • Twitter
  • Contact
Powered by Ghost