Kush KanwarinSilence LaboratoriesShaping the Future of Data Sharing: The Role of Privacy Enhancing TechnologiesIn an era where data breaches are rising and privacy is a key concern for the general public, protecting sensitive data is a crucial…Apr 2
Morten DahlinSnips BlogDifferential Privacy for the Rest of Usby Morten Dahl and Joseph Dureau @ SnipsJul 29, 20161
Morten DahlinCape Privacy (Formerly Dropout Labs)Experimenting with TF EncryptedA Library for Private Machine Learning in TensorFlowOct 19, 2018Oct 19, 2018
Avishay YanaiERC 4337 and MPC: Friends or Foes?Have you ever seen Vitalik angry? it looks like this topic gets him emotional:Mar 12, 2023Mar 12, 2023
Kush KanwarinSilence LaboratoriesShaping the Future of Data Sharing: The Role of Privacy Enhancing TechnologiesIn an era where data breaches are rising and privacy is a key concern for the general public, protecting sensitive data is a crucial…Apr 2
Morten DahlinSnips BlogDifferential Privacy for the Rest of Usby Morten Dahl and Joseph Dureau @ SnipsJul 29, 20161
Morten DahlinCape Privacy (Formerly Dropout Labs)Experimenting with TF EncryptedA Library for Private Machine Learning in TensorFlowOct 19, 2018
Avishay YanaiERC 4337 and MPC: Friends or Foes?Have you ever seen Vitalik angry? it looks like this topic gets him emotional:Mar 12, 2023
Manuel Batalha dos SantosPrivacy-Preserving Computational Biology using Yao protocolIn this story, we elaborate on a topic of computational biology: phylogeny analysis. We digest the algorithm proposed in this paper which…Feb 15, 2022
Avner CoheninHUB SecurityLog4j & Maryland Health Agency Attack 🏥Greetings, readers! Here at HUB Security’s weekly digest, we share the cardinal cyber security stories from the prior week. Not only do we…Dec 15, 2021