Alimama Tech
Alimama Tech
Aug 6, 2025 · Information Security

How Privacy-Enhancing Technologies Are Revolutionizing Data Use in Digital Advertising

This article reviews the background, core techniques, and typical applications of privacy‑enhancing technologies—including secure multi‑party computation, privacy‑preserving machine learning, differential privacy, and trusted execution environments—highlighting their role in unlocking multi‑party data value while ensuring compliance and privacy protection.

Privacy Computingdifferential privacyfederated learning
0 likes · 20 min read
How Privacy-Enhancing Technologies Are Revolutionizing Data Use in Digital Advertising
AntTech
AntTech
Jul 7, 2023 · Information Security

SecretFlow’s YinYu 1.0 Release: New MVP Deployment Package, Expanded Architecture, and Full‑Stack Interoperability

The YinYu 1.0 release introduces an MVP deployment package for privacy‑computing beginners, expands the product, resource, and connectivity layers, adds the Kuscia orchestration framework, enhances algorithm, device, and cryptographic capabilities, and promotes full‑stack interoperability across platforms.

InteroperabilityKusciaMVP deployment
0 likes · 9 min read
SecretFlow’s YinYu 1.0 Release: New MVP Deployment Package, Expanded Architecture, and Full‑Stack Interoperability
DataFunSummit
DataFunSummit
Dec 15, 2022 · Information Security

Multi‑Party Secure Risk Control: Challenges, Architecture, and Practice

This article examines the growing complexity of financial risk scenarios, outlines global privacy regulations, describes Ant Group's three‑layer multi‑party secure risk‑control architecture, showcases anti‑fraud and external client use cases, and discusses current challenges and future directions for secure, privacy‑preserving risk management.

Regulatory Compliancefinancial securityprivacy protection
0 likes · 14 min read
Multi‑Party Secure Risk Control: Challenges, Architecture, and Practice