[PET 1] Privacy Enhancing Technologies – Introduction
Every time you browse a website, click an ad, make a purchase, or train an ML model, data flows through systems. Companies need this data — for analytics, measurement, personalization, and product improvement. But they also have legal, ethical, and…
Read More[PET 1.a] Privacy Enhancing Technologies (PETs) — Part 1
How Your Data Gets Protected Every time you browse a website, click an ad, or make a purchase, data flows through dozens of systems. Companies need this data for analytics, measurement, and personalization—but they also have legal and ethical obligations…
Read More[PET 1.b] Privacy Enhancing Technologies (PETs) — Part 2
Secure Collaboration Without Sharing Raw Data In Part 1, we covered how individual organizations protect data internally — minimization, anonymization, query controls, and differential privacy. But modern business often requires multiple parties to…
Read More[PET 1.c] Privacy Enhancing Technologies (PETs) — Part 3
Privacy-Preserving Computation and Measurement In Part 1, we covered how organizations protect data internally — minimization, anonymization, query controls, and differential privacy. In Part 2, we explored secure collaboration — clean rooms, identity…
Read More[MI 1] An Intuitive Guide to CNNs and RNNs
When your phone recognizes “Hey Siri,” a CNN is probably listening. When Google Translate converts your sentence into French, an RNN (or its descendants) is doing the heavy lifting. Both are neural networks, but they’re built for fundamentally different…
Read More