Skip to content
icon icon Building AI Intuition

Connecting the dots...

icon icon Building AI Intuition

Connecting the dots...

  • Home
  • ML Basics
  • Model Intuition
  • Encryption
  • Privacy Tech
  • Musings
  • About
  • Home
  • ML Basics
  • Model Intuition
  • Encryption
  • Privacy Tech
  • Musings
  • About
Close

Search

Subscribe
icon icon Building AI Intuition

Connecting the dots...

icon icon Building AI Intuition

Connecting the dots...

  • Home
  • ML Basics
  • Model Intuition
  • Encryption
  • Privacy Tech
  • Musings
  • About
  • Home
  • ML Basics
  • Model Intuition
  • Encryption
  • Privacy Tech
  • Musings
  • About
Close

Search

Subscribe
Recent Posts
March 1, 2026
Teaching AI Models: Gradient Descent
March 1, 2026
Needle in the Haystack: Embedding Training and Context Rot
March 1, 2026
Measuring Meaning: Cosine Similarity
February 28, 2026
AI Paradigm Shift: From Rules to Patterns
February 16, 2026
Seq2Seq Models: Basics behind LLMs
February 16, 2026
Word2Vec: Start of Dense Embeddings
February 13, 2026
Advertising in the Age of AI
February 8, 2026
Breaking the “Unbreakable” Encryption – Part 2
February 8, 2026
Breaking the “Unbreakable” Encryption – Part 1
February 8, 2026
ML Foundations – Linear Combinations to Logistic Regression
February 2, 2026
Privacy Enhancing Technologies – Introduction
February 2, 2026
Privacy Enhancing Technologies (PETs) — Part 3
February 2, 2026
Privacy Enhancing Technologies (PETs) — Part 2
February 2, 2026
Privacy Enhancing Technologies (PETs) — Part 1
February 2, 2026
An Intuitive Guide to CNNs and RNNs
February 2, 2026
Making Sense Of Embeddings
November 9, 2025
How CNNs Actually Work
August 17, 2025
How Smart Vector Search Works
Privacy Tech

Privacy Enhancing Technologies (PETs) — Part 1

How Your Data Gets Protected Every time you browse a website, click an ad, or make a purchase, data flows through…

Machine Learning Basics Model Intuition

Needle in the Haystack: Embedding Training and Context Rot

Post 2c/N You’ve probably experienced this: you paste a 50-page document into ChatGPT or Claude, ask a specific…

Privacy Tech

Privacy Enhancing Technologies (PETs) — Part 3

Privacy-Preserving Computation and Measurement In Part 1, we covered how organizations protect data internally —…

Machine Learning Basics

Breaking the “Unbreakable” Encryption – Part 1

If you’ve spent any time in tech, you’ve heard of AES, RSA, and Diffie-Hellman. We treat them like digital…

Model Intuition

An Intuitive Guide to CNNs and RNNs

When your phone recognizes “Hey Siri,” a CNN is probably listening. When Google Translate converts your sentence into…

Machine Learning Basics

How Smart Vector Search Works

In the ever-evolving world, the art of forging genuine connections remains timeless. Whether it’s with colleagues,…

Browse Tag

cvm

1 Article

Privacy Enhancing Technologies (PETs) — Part 2

Archit Sharma By Archit Sharma
7 Min Read

Secure Collaboration Without Sharing Raw Data In Part 1, we covered how individual organizations protect data internally — minimization, anonymization, query controls, and differential privacy. But modern business often requires multiple parties to…

Read More
Privacy Tech

Categories

icons8 pencil 100
ML Basics

Back to the basics

screenshot 1
Model Intuition

Build model intuition

icons8 lock 100 (1)
Encryption

How encryption works

icons8 gears 100
Privacy Tech

What protects privacy

screenshot 4
Musings

Writing is thinking

Recent Posts

  • Teaching AI Models: Gradient Descent
  • Needle in the Haystack: Embedding Training and Context Rot
  • Measuring Meaning: Cosine Similarity
  • AI Paradigm Shift: From Rules to Patterns
  • Seq2Seq Models: Basics behind LLMs
  • Word2Vec: Start of Dense Embeddings
  • Advertising in the Age of AI
  • Breaking the “Unbreakable” Encryption – Part 2
  • Breaking the “Unbreakable” Encryption – Part 1
  • ML Foundations – Linear Combinations to Logistic Regression
Copyright 2026 — Building AI Intuition. All rights reserved. Blogsy WordPress Theme