Mithril Security Blog
  • Website
  • GitHub
  • Documentation
  • Contact
Subscribe

PETs

A collection of 4 posts
Data Science: The Short Guide to Privacy Technologies
Privacy Enhancing Technologies Featured

Data Science: The Short Guide to Privacy Technologies

If you’re wondering what the benefits and weaknesses of differential privacy, confidential computing, federated learning, etc are, and how they can be combined to improve artificial intelligence and data privacy, you’ve come to the right place.
Feb 20, 2023 — 6 min read
Confidential computing explained. Part 3: data in use protection
Privacy Enhancing Technologies

Confidential computing explained. Part 3: data in use protection

Deep dive into the data-in-use protection mechanisms of secure enclaves
Mar 7, 2022 — 7 min read
Confidential computing explained. Part 2 : attestation
Privacy Enhancing Technologies

Confidential computing explained. Part 2 : attestation

An introduction to remote attestation, which is the key to trust a remote enclave.
Feb 17, 2022 — 5 min read
Confidential computing explained. Part 1: introduction
Privacy Enhancing Technologies

Confidential computing explained. Part 1: introduction

An introduction to Confidential Computing and the problems it solves
Feb 13, 2022 — 6 min read
Mithril Security Blog © 2023
  • Twitter
  • Contact
Powered by Ghost