Category: Privacy-Preserving Technologies

Behavioral Biometrics

Behavioural biometrics is a technology that identifies or verifies people based on how they interact with devices or systems. It analyses patterns such as typing speed, mouse movements, touchscreen gestures, or how someone walks. These patterns are unique to individuals and can be used to strengthen security or personalise user experiences. Unlike passwords or fingerprints,…

Certificate Transparency

Certificate Transparency is a system that helps make digital certificates, which secure websites, more open and trustworthy. It works by publicly logging every certificate issued, so anyone can check for mistakes or unauthorised certificates. This helps prevent attackers from creating fake certificates to impersonate websites and improves overall trust in internet security.

Threshold Cryptography

Threshold cryptography is a method of securing sensitive information or operations by splitting a secret into multiple parts. A minimum number of these parts, known as the threshold, must be combined to reconstruct the original secret or perform a secure action. This approach protects against loss or compromise by ensuring that no single person or…

Bulletproofs

Bulletproofs are a type of cryptographic proof that lets someone show a statement is true without revealing any extra information. They are mainly used to keep transaction amounts private in cryptocurrencies, while still allowing others to verify that the transactions are valid. Bulletproofs are valued for being much shorter and faster than older privacy techniques,…