Proving Your Age, Without Giving Away Your Age
Published in
5 min readDec 29, 2023
If we were to start our computing and data architectures again, we certainly wouldn’t build them as we have. Overall, we have a legacy data architecture, and where we often fail to protect sensitive and private information. The usage of encryption, for example, is often seen as a barrier to accessing the data rather than a positive aspect of protecting sensitive data. But, a company that does not store…