Proving Your Age, Without Giving Away Your Age

--

If we were to start our computing and data architectures again, we certainly wouldn’t build them as we have. Overall, we have a legacy data architecture, and where we often fail to protect sensitive and private information. The usage of encryption, for example, is often seen as a barrier to accessing the data rather than a positive aspect of protecting sensitive data. But, a company that does not store…

--

--

Prof Bill Buchanan OBE FRSE
ASecuritySite: When Bob Met Alice

Professor of Cryptography. Serial innovator. Believer in fairness, justice & freedom. Based in Edinburgh. Old World Breaker. New World Creator. Building trust.