Privacy Enhancing Technologies Decision Tree for developers and managers looking to integrate privacy into their software pipelines and products.
Latest Posts
Cybersecurity and Privacy: Complements for a more secure Internet
There exists a vibrant ecosystem of specialized security tools. The sad truth is that it is almost impossible to reach 100% invulnerability. What can we do to get closer?
Customers Are Demanding Privacy
In the past three years there has been a massive wake-up in customer awareness about privacy. Many customers are now refactoring how they buy, taking their business elsewhere if they don’t trust a company’s data practices.
Liability & AI Malfunction: An AI System Developer’s Perspective
AI is rapidly being deployed around the world with few to follow. Along with the complexity of creating the technology, there remain many unanswered legal questions.
Accelerating Tensorflow Lite with XNNPACK
The new Tensorflow Lite XNNPACK delegate enables best in-class performance on x86 and ARM CPUs — over 10x faster than the default Tensorflow Lite backend in some cases.
NVIDIA DALI: Speeding up PyTorch
Some techniques to improve DALI resource usage & create a completely CPU-based pipeline.
Perfectly Privacy-Preserving Artificial Intelligence
We introduce the four pillars required to achieve perfectly privacy-preserving AI and discuss various technologies that can help address each of the pillars.
Homomorphic Encryption for Beginners: A Practical Guide (Part 2)
We discuss a practical application of homomorphic encryption to privacy-preserving signal processing, particularly focusing on the Fourier transform.
Homomorphic Encryption for Beginners: A Practical Guide (Part 1)
We cover the basics of homomorphic encryption, followed by a brief overview of open source HE libraries and a tutorial on how to use one of those libraries (namely, PALISADE).
Why is Privacy-Preserving Natural Language Processing Important?
A number of people ask us why we should bother creating NLP tools that preserve privacy. Apparently not everyone spends hours thinking about data breaches and privacy infringements.
A Brief Overview of Privacy-Preserving Software Methods
We cover symmetric encryption, asymmetric encryption, homomorphic encryption, differential privacy, and secure multi-party computation.
Recent Comments