Privacy-enhancing technologies, in particular Zero-Knowledge Proofs (ZKPs), can challenge, reinforce, or redefine these disclosure obligations.| Least Authority
Deep dive into the data-in-use protection mechanisms of secure enclaves| Mithril Security Blog
Here, we provide a deep dive into Confidential Computing, how it can protect data privacy, and where it comes from?| Mithril Security Blog
An introduction to remote attestation, which is the key to trust a remote enclave.| Mithril Security Blog
Learn how differential privacy (adding statistical noise to data) lets us find patterns in the crowd—without revealing anything about the people in it.| Firewalls Don't Stop Dragons
One of the most basic ways we're tracked on the internet is via our IP address. Onion routing can mask your true IP address. I'll explain how to use it.| Firewalls Don't Stop Dragons
The massive increase in sharing of personal data has greatly increased our need for privacy enhancing technologies. I'll explain the most promising ones.| Firewalls Don't Stop Dragons
An introduction to Confidential Computing and the problems it solves| Mithril Security Blog