We work with the latest technologies like homomorphic encryption, synthetic data, zero knowledge proofs and so on to ensure that even the adversary has a quantum computer, they cannot derive the original personal data if they participate in this shared open data research.

Keyboard shortcuts

j previous speech k next speech