-

Sovereign AI in Europe: what changes when systems go live
“Sovereign AI” is moving from conferences into budgets. At its simplest, sovereign AI means a…
-

Podcast: AI Security Hype vs Reality
AI Security Hype vs Reality: The Year Attackers Got Smarter For years, AI in cybersecurity…
-

Homomorphic Encryption vs Trusted Execution Environments: What Recent Attacks Reveal
Trusted Execution Environments (TEEs) were once the crown jewel of confidential computing. Intel SGX, AMD…
-

Wodan AI Partners with Tunnel ID to Deliver Privacy-Preserving Identity Verification
We’re excited to announce our partnership with Tunnel ID, bringing together two breakthrough technologies to…
-

Privacy-First AI for Health: How Ciphertext Keeps Saving Lives
A pager goes off in the cardiac unit at 01:37. A nurse has to send…
-

Why FHE in Federated Learning?
Why FHE in Federated Learning? 1. Enhanced Privacy: FL already ensures data stays on the…
-

How does Fully homomorphic encryption (FHE) differ from Partial homomorphic encryption (PHE)?
Homomorphic encryption is a cutting-edge cryptographic technique that allows computations on encrypted data without decryption,…
-

An Overview of Fully Homomorphic Encryption (FHE): Understanding Its Significance and Applications
Fully Homomorphic Encryption (FHE) What is Fully Homomorphic Encryption? Fully Homomorphic Encryption (FHE) is an…

