Traditionally, companies have relied upon data masking, sometimes called de-identification, to protect data privacy. The basic idea is to remove all personally identifiable information (PII) from each ...
Alexandra Wood, Micah Altman, Kobbi Nissim, and Salil Vadhan—collaborators with the Privacy Tools project—published a chapter in the Handbook on Using ...
Being able to share information about a group of people without compromising any individual person’s privacy kinda sounds like a form of wizardry. But it’s not. It’s just math. I say “just” not to ...
A monthly overview of things you need to know as an architect or aspiring architect. Unlock the full InfoQ experience by logging in! Stay updated with your favorite authors and topics, engage with ...
An Apple software engineer recently revealed that Apple is now rolling out its use of differential privacy to cover both web browsing and health data, as it now uses the technique to process millions ...
Hiding sensitive data in a sea of noise might have more value than encryption in some use cases. Here are the most likely differential privacy applications and their trade-offs. In the past, the ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results