Forem

# privacy

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
How to Build Courtroom-Ready CIPA & GDPR Evidence Reports for Website Tracking Violations (2025 Guide)
Cover image for How to Build Courtroom-Ready CIPA & GDPR Evidence Reports for Website Tracking Violations (2025 Guide)

How to Build Courtroom-Ready CIPA & GDPR Evidence Reports for Website Tracking Violations (2025 Guide)

Comments
2 min read
Cyberspace Visibility and Privacy: Why Your Router Might Appear in ZoomEye

Cyberspace Visibility and Privacy: Why Your Router Might Appear in ZoomEye

1
Comments
2 min read
Security, Privacy, and Trust in Web3 Systems

Security, Privacy, and Trust in Web3 Systems

1
Comments 1
4 min read
Huralya: Building Private AI Assistants on Oasis
Cover image for Huralya: Building Private AI Assistants on Oasis

Huralya: Building Private AI Assistants on Oasis

4
Comments 5
2 min read
Neuromarketing in Practice: Strategies to Tap into Subconscious Consumer Decisions

Neuromarketing in Practice: Strategies to Tap into Subconscious Consumer Decisions

Comments
7 min read
Ethical Data Practices Every Developer Should Care About in 2025
Cover image for Ethical Data Practices Every Developer Should Care About in 2025

Ethical Data Practices Every Developer Should Care About in 2025

2
Comments 1
3 min read
⚙️ New TEE vulnerabilities what’s up and who’s affected
Cover image for ⚙️ New TEE vulnerabilities what’s up and who’s affected

⚙️ New TEE vulnerabilities what’s up and who’s affected

2
Comments 4
1 min read
ERC-8004: Building Trustless Autonomous Agents with TEEs

ERC-8004: Building Trustless Autonomous Agents with TEEs

3
Comments 3
2 min read
PyLlamaUI Update

PyLlamaUI Update

4
Comments
1 min read
Fort Knox for AI: Protecting Your Models with Verifiable Split Learning

Fort Knox for AI: Protecting Your Models with Verifiable Split Learning

5
Comments
2 min read
Fortress AI: Shielding Collaborative Models with Zero-Knowledge Verification

Fortress AI: Shielding Collaborative Models with Zero-Knowledge Verification

5
Comments
2 min read
Lockdown LLMs: Unleashing AI Power While Safeguarding User Privacy

Lockdown LLMs: Unleashing AI Power While Safeguarding User Privacy

1
Comments
2 min read
Fort Knox AI: Verifiable Security for Distributed Machine Learning by Arvind Sundararajan

Fort Knox AI: Verifiable Security for Distributed Machine Learning by Arvind Sundararajan

5
Comments
2 min read
Guardian AI: Zero-Knowledge Proofs for Secure Split Learning

Guardian AI: Zero-Knowledge Proofs for Secure Split Learning

5
Comments
2 min read
Cross-domain Cookies: Building Less Annoying Consent Solutions

Cross-domain Cookies: Building Less Annoying Consent Solutions

1
Comments
4 min read
Unlocking LLMs: Secure Inference for the Rest of Us

Unlocking LLMs: Secure Inference for the Rest of Us

1
Comments
2 min read
Unlock LLM Potential at the Edge: Secure, Efficient Inference Without the Cloud

Unlock LLM Potential at the Edge: Secure, Efficient Inference Without the Cloud

5
Comments
2 min read
Private Graphs, Public Insights: Feature Propagation with a Twist by Arvind Sundararajan

Private Graphs, Public Insights: Feature Propagation with a Twist by Arvind Sundararajan

1
Comments
2 min read
VERT.sh: The File Converter That Never Sees Your Files (Thanks, WebAssembly!)

VERT.sh: The File Converter That Never Sees Your Files (Thanks, WebAssembly!)

1
Comments
3 min read
Gemini Protocol: A Minimalist Alternative to the Web

Gemini Protocol: A Minimalist Alternative to the Web

2
Comments
9 min read
Unlock Hidden Insights: Privacy-Preserving Graph Learning on Sparse Data by Arvind Sundararajan

Unlock Hidden Insights: Privacy-Preserving Graph Learning on Sparse Data by Arvind Sundararajan

1
Comments
2 min read
Security at Scale: Our npm Incident Response Story
Cover image for Security at Scale: Our npm Incident Response Story

Security at Scale: Our npm Incident Response Story

Comments
2 min read
Privacy, Data Handling, and Regulatory Compliance in Angular Applications

Privacy, Data Handling, and Regulatory Compliance in Angular Applications

6
Comments
3 min read
Unlocking AI's Potential: Secure Language Models for Sensitive Data

Unlocking AI's Potential: Secure Language Models for Sensitive Data

5
Comments
2 min read
🔥 Burn After Reading — Because Sometimes, Files Shouldn’t Live Forever
Cover image for 🔥 Burn After Reading — Because Sometimes, Files Shouldn’t Live Forever

🔥 Burn After Reading — Because Sometimes, Files Shouldn’t Live Forever

1
Comments
1 min read
loading...