Oblivious DevsMax Schrems Unpacks Global Privacy Shifts at Eyes-Off Data Summit 2024Max Schrems’ talk, which kicked off the first day of the Eyes-Off Data Summit 2024, was the perfect introduction to the tensions between…Oct 10
ginoongbakulawinBeyond the Crypto HorizonTime to research: RailgunRAILGUN is a privacy system built directly on-chain for Ethereum, BSC, Polygon, and Arbitrum. It uses Zero-Knowledge (ZK) cryptography to…Apr 25
Oblivious DevsFrom Theory to Practice: Inside Differential Privacy SystemsExplore implementations of differential privacy in various scenarios, giving you an overview of differential privacy systems utilised today…Oct 1Oct 1
Oblivious DevsEyes-Off Data Summit 2024 Offered a Deep Dive into the Future of Privacy and Data GovernanceMissed this year’s Eyes-Off Data Summit in Dublin? Catch up on key insights from day 1 in this article.Oct 1Oct 1
The Center for Effective Global ActioninCEGAHomomorphic Encryption for Cross-Border ComputationPrivacy Enhancing Technologies (PETs) can protect privacy and enable responsible data use. But what are they and how can they be used?May 9May 9
Oblivious DevsMax Schrems Unpacks Global Privacy Shifts at Eyes-Off Data Summit 2024Max Schrems’ talk, which kicked off the first day of the Eyes-Off Data Summit 2024, was the perfect introduction to the tensions between…Oct 10
ginoongbakulawinBeyond the Crypto HorizonTime to research: RailgunRAILGUN is a privacy system built directly on-chain for Ethereum, BSC, Polygon, and Arbitrum. It uses Zero-Knowledge (ZK) cryptography to…Apr 25
Oblivious DevsFrom Theory to Practice: Inside Differential Privacy SystemsExplore implementations of differential privacy in various scenarios, giving you an overview of differential privacy systems utilised today…Oct 1
Oblivious DevsEyes-Off Data Summit 2024 Offered a Deep Dive into the Future of Privacy and Data GovernanceMissed this year’s Eyes-Off Data Summit in Dublin? Catch up on key insights from day 1 in this article.Oct 1
The Center for Effective Global ActioninCEGAHomomorphic Encryption for Cross-Border ComputationPrivacy Enhancing Technologies (PETs) can protect privacy and enable responsible data use. But what are they and how can they be used?May 9
Rachel DulberginCodeXPrivacy Enhancing Technologies and why they’re vital for healthcare innovationData is the lifeblood of AI powered research. But in healthcare, a data access problem is stifling much needed innovation. An emerging set…Sep 2, 2021
Inception CapitalinInception CapitalInvesting in Fair MathFair Math stands at the forefront of privacy computing with a general purpose fully homomorphic encryption (FHE) computing platform that…Feb 29
Privacy VigilantePrivacy for Third-Party ManagementEssential Practices for a Successful TPM ProgramFeb 8