Privacy Engineering

Privacy Engineering: Why Standards Are Still Out of Reach?

Privacy Engineering: Why Standards Are Still Out of Reach?

In contemporary technology environments, organisations are increasingly challenged with the …

 Policy Zones: Purpose Limitation at Scale using Information Flow Control

Policy Zones: Purpose Limitation at Scale using Information Flow Control

At the heart of privacy lies the principle of purpose limitation, dictating that data should only be …

Differential Privacy: 6 Key Equations Explained

Differential Privacy: 6 Key Equations Explained

Differential Privacy is a powerful framework for ensuring privacy in data analysis by adding …

Input vs Output Privacy

Input vs Output Privacy

Privacy in data systems has traditionally focused on protecting sensitive information as it enters a …

Birds of a Feather Leak Together: The Set Bias Privacy Problem

Birds of a Feather Leak Together: The Set Bias Privacy Problem

Secure multi-party computation (SMPC) enables organisations to collaborate on sensitive data …

Privacy-Preserving Multi-Touch Attribution at TikTok

Privacy-Preserving Multi-Touch Attribution at TikTok

Multi-touch attribution is considered as holy grail in advertising industry. As advertisers are …

The Where's Waldo Effect in Privacy

The Where's Waldo Effect in Privacy

Safeguarding individual privacy inherently means data minimisation i.e. limiting the collection and …

Top-down vs. Bottom up Privacy

Top-down vs. Bottom up Privacy

Tech companies and large consumer businesses are grappling with how best to protect end-user data …

Distributed Aggregation Protocol (DAP) Primer

Distributed Aggregation Protocol (DAP) Primer

In last post we covered, Privacy Preserving Measurement (PPM) and discussed how Distributed …