I recently discussed how Confidential Computing allows us to analyse and use data without actually seeing it. A key component of Confidential Computing is Privacy-Preserving Record Linkage…
How to Detect, Deter and Disrupt Crime & Fraud using Confidential Computing
Blame it on misguided youth, blame it on greed, or blame it on just plain ignorance, but I have a confession to make: I spent…