Of Privacy and Purse Strings

A gentle introduction to privacy budgets and accounting The word budget is defined as “an estimate of income and expenditure for a set peri

OpenMined Featured Contributor: January 2022

Interview with Ishan Mistry Github: @mistryishan25 Where are you based? "Gujarat, India " What do you do (i.e. studying, working, etc.)? "

OpenMined Featured Contributor: December 2021

Interview with Gonzalo Munilla Garrido, OpenMined's Featured Contributor for November 2021!

Is My Fake Data Real Enough?

Synthetic data and validation of its expected behavior The research focused on the generation of synthetic data has gained pace like never

Can privacy of medical images be ensured through proxy data?

This is the summary of the paper 'Defending Medical Image Diagnostics against Privacy Attacks using Generative Methods' that was presented a

OpenMined Featured Contributor: November 2021

Interview with Daniel Huynh, OpenMined's Featured Contributor for December 2021!

OpenMined Featured Contributor: October 2021

Interview with Nabanita Dash, OpenMined's Featured Contributor for October 2021!

COINSTAC: Decentralized, Differentially Private Application for Neuroimaging

Summary of Talk by Eric Verner, Associate Director of Innovation at Centre for Translation Research in Neuroimaging and Data Science.MOTIVAT

Design a federated learning system in seven steps

What should you consider when building an enterprise federated learning system?Photo by Hunter Harritt on UnsplashIntroductionCompanies like

Fully Homomorphic Encryption (FHE) Frameworks

Attendees of First Workshop of Homomorphic Encryption (HE) communityHomomorphic Encryption cryptosystem is a cryptosystem whose decryption i

Understanding the role of Privacy Enhancing Technologies (PETs) in the IoT Data Market.

The data generated by the Internet of Things (IoT) is leading a positive transformation across industries, not only in traditional ones such

OpenMined Featured Contributor: September 2021

Interview with Ayoub Benaissa, OpenMined's Featured Contributor for September 2021!

Making autonomous vehicles robust with active learning, federated learning & V2X communication

When we think of driving in general, there are good drivers and bad drivers. So, on a 2D spectrum, we would picture a cluster of data of those drivers and realise that the good drivers’ data is clustered around a particular coordinate(x,y) while the bad drivers’ data is all over the place.

Step by step Towards the Differential Privacy: Randomized Response in Privacy

“Privacy is obtained by the process, there are no “good” or “bad” responses”[3] Allegory of Grammar and Logic/Dialectic. Perugia, fontana&nb

OpenMined Featured Contributor: August 2021

Interview with George Muraru, OpenMined's Featured Contributor for August 2021!

OpenMined Featured Contributor: July 2021

Interview with Irina Bejan, OpenMined's Featured Contributor for July 2021!

Install PySyft using Conda

PySyft is a Python library for secure and private Deep Learning. It uses Federated Learning, Differential Privacy, and Encrypyted Computatio

Yes, privacy is worth the effort. Here’s why

When we advocate for privacy, we tend to concentrate on the negative consequences of privacy violations [56; 32; 19; 50]. These portrayals a

OpenMined Featured Contributor: June 2021

Interview with George Kaissis, OpenMined's Featured Contributor for June 2021!

Interview with Chinmay Shah: Differential Privacy Team Lead at OpenMined

In this interview, Chinmay Shah, who leads the Differential Privacy team at OpenMined, talks about his interests, the team's journey and the exciting road ahead!

The Next Generation of Data Ethics Tools

In early 2021, Consequential, alongside the Open Data Institute (ODI), conducted a short, qualitative research project to explore the impact of data ethics tools in supporting a vision of a world where tech and data works for everyone.

Private AI: Machine Learning on Encrypted Data

Protect privacy of your data by encrypting it. Outsource computations on the encrypted data, and decrypt at your end to view results.

Local sensitivity for differential privacy from scratch

In this code tutorial, I show the difference between local and global sensitivity, and program from scratch how to calculate local sensitivity for both the bounded and unbounded definitions of differential privacy.

Structured Transparency Continued: Verifying Inputs and Outputs

More on Structured Transparency: Input and Output Verification, and Flow Governance