Articles of Privacy Protection

SheKnows 丨 self-evolution, how does the public chain lead technological innovation?

From the birth of Bitcoin, to the emergence of smart contracts, to the cross-chain cross-chain, public chains have led almost every major technological innovation. However, from the TPS competition, to the Dapp ecological competition, and then to the beachfront DeFi, the road to public landing has never been smooth. At the same time, major manufacturers […]

Free and Easy Weekly Review 丨 Can't Blockchain Privacy Protection and Regulation Have Both? Actually!

Introduction: As more and more countries upgrade blockchain technology to national strategic status, the participants and strength of relevant research will also be significantly enhanced. This week's report will cover the latest academic papers, hard-core technical articles on blockchain related disciplines, and the technological progress of major blockchain projects, providing a reference for blockchain developers, […]

Google Privacy Intersection and Technical Analysis 1 – Application Scenario Analysis

In the process of multi-party collaboration, the issue of privacy has been concerned for a long time. How to solve it? The cryptography community has proposed a number of solutions, such as full homomorphic encryption and multiparty computing. These technologies are universal and can be placed wherever you need them. However, due to the nature […]

Who will protect your privacy? Encrypt "weapons" to learn about | Geekhub offline activities

On Thursday (August 8th) evening, the “Blockchain Landing – You Must Know Password Privacy” sponsored by the Babbitt Accelerator, Dimension, Nervos and the founders, Geekhub offline activities were held at Zhejiang University of Finance and Economics. The event invited the zero-knowledge proof researcher Li Xing , Nervos community operation Lai Jiaqi , Dimension Chain founder […]

Google launches new secure multi-party computing open source library to collaborate with data in a privacy-safe manner

Google Inc. continues to invest in new research to drive innovation and protect personal privacy. Earlier this year, the password checker was introduced, a Chrome extension that helps users detect if their username and password entered on the site have been compromised. It relies on an encryption protocol called Privacy Set Intersection (PSI) to match […]

Video|"8Q" PlatON Cloud CSO Xiao Ziwen: What can we do in the face of the giant's extraction?

Xiao Ziwen, Chief Strategy Officer of Platon Cloud, Bachelor of Economics, Trinity College, University of Cambridge, UK, Master of Business Administration, Columbia University Business School. Wanxiang Blockchain Lab and the early founder of Distributed Capital, successively head of investment and cooperation for the Wanxiang Blockchain Laboratory, worked for CICC. Like many people, Xiao Ziwen once […]

Talking about safety from the currency and the "stolen"

Talking about safety from the currency and the "stolen" UOC avanna One pot When a security incident occurs, the shabu-shabu is an excellent excuse for hackers. It is very "romantic." Selling VPN services will always be serious, saying that it will never keep any records; Apple, FB, all promised, will not reveal user privacy; Cloud […]

Blockchain privacy development company QEDIT completed $10 million in Series A financing, Ant Financial

QEDIT, a company that develops privacy technology for the enterprise blockchain, has completed a $10 million Series A round of investor participation, including Ant Financial. The two companies announced on Tuesday that Ant Financial will also incorporate QEDIT's zero-knowledge proof (ZKP) technology into its blockchain project . Other well-known partners applying QEDIT ZKP include software […]

Blockchain + Data Privacy Security: Breaking the weapon of the "ring prison" in the data age

In 1785, the British philosopher Bentham proposed the famous "ring prison" design: this prison consists of a central tower and a ring-shaped cell. The prisoner is in the cell on the edge of the ring and the monitor is in the central tower. This design allows only one monitor to know the prisoner 's every […]