Fully Homomorphic Encryption (FHE) Frameworks

Attendees of First Workshop of Homomorphic Encryption (HE) communityHomomorphic Encryption cryptosystem is a cryptosystem whose decryption i

Understanding the role of Privacy Enhancing Technologies (PETs) in the IoT Data Market.

The data generated by the Internet of Things (IoT) is leading a positive transformation across industries, not only in traditional ones such

OpenMined Featured Contributor: September 2021

Interview with Ayoub Benaissa, OpenMined's Featured Contributor for September 2021!

Making autonomous vehicles robust with active learning, federated learning & V2X communication

When we think of driving in general, there are good drivers and bad drivers. So, on a 2D spectrum, we would picture a cluster of data of those drivers and realise that the good drivers’ data is clustered around a particular coordinate(x,y) while the bad drivers’ data is all over the place.

Step by step Towards the Differential Privacy: Randomized Response in Privacy

“Privacy is obtained by the process, there are no “good” or “bad” responses”[3] Allegory of Grammar and Logic/Dialectic. Perugia, fontana&nb

OpenMined Featured Contributor: August 2021

Interview with George Muraru, OpenMined's Featured Contributor for August 2021!

OpenMined Featured Contributor: July 2021

Interview with Irina Bejan, OpenMined's Featured Contributor for July 2021!

Install PySyft using Conda

PySyft is a Python library for secure and private Deep Learning. It uses Federated Learning, Differential Privacy, and Encrypyted Computatio

Yes, privacy is worth the effort. Here’s why

When we advocate for privacy, we tend to concentrate on the negative consequences of privacy violations [56; 32; 19; 50]. These portrayals a

OpenMined Featured Contributor: June 2021

Interview with George Kaissis, OpenMined's Featured Contributor for June 2021!

Interview with Chinmay Shah: Differential Privacy Team Lead at OpenMined

In this interview, Chinmay Shah, who leads the Differential Privacy team at OpenMined, talks about his interests, the team's journey and the exciting road ahead!

The Next Generation of Data Ethics Tools

In early 2021, Consequential, alongside the Open Data Institute (ODI), conducted a short, qualitative research project to explore the impact of data ethics tools in supporting a vision of a world where tech and data works for everyone.

Private AI: Machine Learning on Encrypted Data

Protect privacy of your data by encrypting it. Outsource computations on the encrypted data, and decrypt at your end to view results.

Local sensitivity for differential privacy from scratch

In this code tutorial, I show the difference between local and global sensitivity, and program from scratch how to calculate local sensitivity for both the bounded and unbounded definitions of differential privacy.

Structured Transparency Continued: Verifying Inputs and Outputs

More on Structured Transparency: Input and Output Verification, and Flow Governance

Private Deep Learning of Medical Data for Hospitals using Federated Learning and Differential Privacy

Speakers: Kritika Prakash , Lucile Saulnier, Dmitrii Usynin, Zarreen Naowal Reza This talk provides an example of  private deep learning u

Global sensitivity for differential privacy from scratch

In this code tutorial, I show how to implement empirically the calculation of the global sensitivity for the bounded and unbounded definitions of differential privacy.

OpenMined Featured Contributor: May 2021

Interview with Thiago Costa Porto, OpenMined's Featured Contributor for May 2021!

Defining Privacy Tech

An attempt to avoid talking past each other so we can instead direct our efforts towards moving the needle on privacy through privacy innovation

Neural Networks as Steganographic Vehicles

Steganography is the art of hiding information. In this blog post we’ll see how neural networks can be used as a vehicle for covert communication.

Differential Privacy from Program Analysis Perspective

An interview with Yuxin Wang, a rising star in programming analysis of differential privacy.

Confidential Computing Explained. Part 2 : Attestation

This post introduces the concept of attestation with Intel SGX enclaves

Differential Identifiability

In this code tutorial, we implement differential identifiability, a differential privacy definition produced by Jaewoo Lee et al. This definitions helps practitioners to decide in a more intuitive manner what the value of epsilon should be, a major problem in the field.

OpenMined Featured Contributor: April 2021

Interview with Fatemeh Mireshghallah, OpenMined's Featured Contributor for April 2021!