Posts by Tag

security

Secure Machine Learning

In previous posts (Zero Trust, MPC-1), I described the importance of Secure Multiparty Computation and showed a simple use case for it, a secure weather appl...

MPC Part 1: Oblivious Transfer

Consider a weather app that you have on your phone. For most users, this app records the current GPS location, sends it to a server and receives and displays...

Absolute Security with No Trust

Designing and implementing secure software solutions usually involves a discussion about the level of security and the effort and cost of achieving that leve...

Back to Top ↑

theory

Absolute Security with No Trust

Designing and implementing secure software solutions usually involves a discussion about the level of security and the effort and cost of achieving that leve...

Back to Top ↑

oblivious transfer

MPC Part 1: Oblivious Transfer

Consider a weather app that you have on your phone. For most users, this app records the current GPS location, sends it to a server and receives and displays...

Back to Top ↑

practical

Secure Machine Learning

In previous posts (Zero Trust, MPC-1), I described the importance of Secure Multiparty Computation and showed a simple use case for it, a secure weather appl...

Back to Top ↑

cli

Source code to pdf

TL;DR concatenate all the files into one gigantic file, apply syntax highlighting and convert to html using pygmentize. Convert the html file to pdf using wk...

Back to Top ↑