Recent Posts

Secure Machine Learning

In previous posts (Zero Trust, MPC-1), I described the importance of Secure Multiparty Computation and showed a simple use case for it, a secure weather appl...

MPC Part 1: Oblivious Transfer

Consider a weather app that you have on your phone. For most users, this app records the current GPS location, sends it to a server and receives and displays...

Absolute Security with No Trust

Designing and implementing secure software solutions usually involves a discussion about the level of security and the effort and cost of achieving that leve...