Privacy Enhancing Technologies Featured Data Science: The Short Guide to Privacy Technologies If you’re wondering what the benefits and weaknesses of differential privacy, confidential computing, federated learning, etc are, and how they can be combined to improve artificial intelligence and data privacy, you’ve come to the right place.
Privacy Enhancing Technologies Confidential computing explained. Part 3: data in use protection Deep dive into the data-in-use protection mechanisms of secure enclaves
Privacy Enhancing Technologies Confidential computing explained. Part 2 : attestation An introduction to remote attestation, which is the key to trust a remote enclave.
Privacy Enhancing Technologies Confidential computing explained. Part 1: introduction An introduction to Confidential Computing and the problems it solves