Recent revelations from Facebook have highlights again how the business of data puts the privacy of wide populations at risk. Many of the largest and most successful companies, such as Facebook, Google, Amazon and more build highly profitable businesses by deriving insights from our personal information to better sell us products. More efficient sales and …
Continue reading “Facebook, Privacy and the Business of Data”
Read MoreWhenever a running program needs to do anything useful – such as write to a file or open a network connection – it has to temporarily hand control of the processor to the kernel to carry out the job. This mode switching between programs and the kernel are potentially time consuming. In order to be …
Continue reading “Meltdown, Spectre and Protection from Kernel Vulnerabilities”
Read MoreIn the design of Duality’s Secure Insights as a Service™, we are often faced with a scenario where there are two entities, a model-owning organization that holds a machine learning model and a data owning organization that holds data that it wants to be classified using the model (a very similar scenario arises in Duality’s …
Continue reading “HYBRID METHODS FOR ENCRYPTED COMPUTING”
Read MoreIn addition to becoming widely used in practice, homomorphic encryption is also in the process of being standardized. Duality technologies has been a leader in this effort, but we’ve had many brand-name partners in the effort who all see it in their interest to use standardized homomorphic encryption technologies, like the open-source PALISADE technologies that …
Continue reading “HOMOMORPHIC ENCRYPTION STANDARDIZATION”
Read More