We invite the cyber security community, the mathematics community to inspect the algorithm and show conclusively that it cannot actually compromise privacy. Then the operators, such as the telecom operators take the same code packaged in a container, run it in their data center, and only publish the end result.

Keyboard shortcuts

j previous speech k next speech