Privacy Enhancing Technologies

Daniel Huynh
Members Public

Confidential Computing: A History

Here, we provide a deep dive into Confidential Computing, how it can protect data privacy, and where it comes from?

Corentin Lauverjat
Members Public

Identifying a Critical Attestation Bypass Vulnerability in Apache Teaclave

This vulnerability can be used to mount a Man in the Middle attack. We found a fix that Teaclave implemented following the release of this article.

Raphaël Millet
Members Public

Mithril x Avian: Zero Trust Digital Forensics and eDiscovery

How we partnered with Avian to deploy sensitive Forensic services thanks to Zero Trust Elastic search.

Daniel Huynh
Members Public

Data Science: The Short Guide to Privacy Technologies

If you’re wondering what the benefits and weaknesses of differential privacy, confidential computing, federated learning, etc are, and how they can be combined to improve artificial intelligence and data privacy, you’ve come to the right place.

Daniel Huynh
Members Public

How Python Data Science Libraries Can Be Hijacked (and What You Can Do About It)

Hackers can easily hijack the data science libraries you use every day and get full access to the datasets you are working with. Data owners need tools to prevent it from happening.

Daniel Huynh
Members Public

Introducing BastionLab - A Simple Privacy Framework for Data Science Collaboration

BastionLab is a simple privacy framework for data science collaboration. It lets data owners protect the privacy of their datasets and enforces that only privacy-friendly operations are allowed on the data and anonymized outputs are shown to the data scientist.

Daniel Huynh
Members Public

Introducing BastionAI, an Open-Source Privacy-Friendly AI Training Framework in Rust

Discover BastionAI, a Rust project for Confidential deep learning training. BastionAI leverages Confidential Computing and Differential Privacy to make AI training between multiple parties more privacy-friendly

Daniel Huynh
Members Public

Confidential Medical Image Analysis with COVID-Net and BlindAI

Deploy medical image analysis with confidentiality thanks to BlindAI

Daniel Huynh
Members Public

Confidential Computing Explained. Part 3: Data In Use Protection

Deep dive into the data-in-use protection mechanisms of secure enclaves

Daniel Huynh
Members Public

Confidential Computing Explained. Part 2 : Attestation

An introduction to remote attestation, which is the key to trust a remote enclave.

Daniel Huynh
Members Public

Confidential Computing Explained. Part 1: Introduction

An introduction to Confidential Computing and the problems it solves