Oblivious DevsMax Schrems Unpacks Global Privacy Shifts at Eyes-Off Data Summit 2024Max Schrems’ talk, which kicked off the first day of the Eyes-Off Data Summit 2024, was the perfect introduction to the tensions between…Oct 10
InBeyond the Crypto HorizonbyginoongbakulawTime to research: RailgunRAILGUN is a privacy system built directly on-chain for Ethereum, BSC, Polygon, and Arbitrum. It uses Zero-Knowledge (ZK) cryptography to…Apr 25
Oblivious DevsFrom Theory to Practice: Inside Differential Privacy SystemsExplore implementations of differential privacy in various scenarios, giving you an overview of differential privacy systems utilised today…Oct 1Oct 1
Oblivious DevsEyes-Off Data Summit 2024 Offered a Deep Dive into the Future of Privacy and Data GovernanceMissed this year’s Eyes-Off Data Summit in Dublin? Catch up on key insights from day 1 in this article.Oct 1Oct 1
InCEGAbyThe Center for Effective Global ActionHomomorphic Encryption for Cross-Border ComputationPrivacy Enhancing Technologies (PETs) can protect privacy and enable responsible data use. But what are they and how can they be used?May 9May 9
Oblivious DevsMax Schrems Unpacks Global Privacy Shifts at Eyes-Off Data Summit 2024Max Schrems’ talk, which kicked off the first day of the Eyes-Off Data Summit 2024, was the perfect introduction to the tensions between…Oct 10
InBeyond the Crypto HorizonbyginoongbakulawTime to research: RailgunRAILGUN is a privacy system built directly on-chain for Ethereum, BSC, Polygon, and Arbitrum. It uses Zero-Knowledge (ZK) cryptography to…Apr 25
Oblivious DevsFrom Theory to Practice: Inside Differential Privacy SystemsExplore implementations of differential privacy in various scenarios, giving you an overview of differential privacy systems utilised today…Oct 1
Oblivious DevsEyes-Off Data Summit 2024 Offered a Deep Dive into the Future of Privacy and Data GovernanceMissed this year’s Eyes-Off Data Summit in Dublin? Catch up on key insights from day 1 in this article.Oct 1
InCEGAbyThe Center for Effective Global ActionHomomorphic Encryption for Cross-Border ComputationPrivacy Enhancing Technologies (PETs) can protect privacy and enable responsible data use. But what are they and how can they be used?May 9
InInception CapitalbyInception CapitalInvesting in Fair MathFair Math stands at the forefront of privacy computing with a general purpose fully homomorphic encryption (FHE) computing platform that…Feb 29
Privacy VigilantePrivacy for Third-Party ManagementEssential Practices for a Successful TPM ProgramFeb 8
InPrivacyRise HubbyLorenzo GhiniAdapt or Face Obsolescence: The Impact of Phasing Out Third-Party Cookies on Digital MarketingIn this article, we aim to clarify what third-party cookies are, why they pose a threat to the digital marketing ecosystem, and how Google…Nov 10, 2023