Breaking the “Unbreakable” Encryption – Part 2
In Part 1, we covered the “Safe” (Symmetric) and the “Mailbox” (Asymmetric). The TL;DR: we use high-speed symmetric safes to store our data, but we rely on mathematical “couriers” to deliver the keys. Today,…
Read MoreBreaking the “Unbreakable” Encryption – Part 1
If you’ve spent any time in tech, you’ve heard of AES, RSA, and Diffie-Hellman. We treat them like digital duct tape—they just work, they keep our data safe, and we don’t think about them. But there’s a massive “Quantum…
Read MorePrivacy Enhancing Technologies – Introduction
Every time you browse a website, click an ad, make a purchase, or train an ML model, data flows through systems. Companies need this data — for analytics, measurement, personalization, and product improvement. But they also have legal, ethical, and…
Read MorePrivacy Enhancing Technologies (PETs) — Part 2
Secure Collaboration Without Sharing Raw Data In Part 1, we covered how individual organizations protect data internally — minimization, anonymization, query controls, and differential privacy. But modern business often requires multiple parties to…
Read More