Privacy Enhanced Computation

Does Real Queryable Encryption mean there is a Fake Queryable Encryption?
TLDR There is no “fake” queryable encryption, but a certain NoSQL database provider has coined the term “Queryable Encryption”, and Baffle has something to say about that. Background To understand real queryable ...

Baffle’s Proxy Architecture
Baffle implements database encryption and role-based access control using a reverse proxy configuration that operates at the SQL session layer. This blog will explore what that means and compare it to competing ...

Privacy Enhanced Computation Technologies Advantages and Disadvantages
Privacy enhanced computation technologies allow data teams to perform operations on encrypted data. In this blog post, we discussed various technologies. The post Privacy Enhanced Computation Technologies Advantages and Disadvantages appeared first ...