Blog
Category: Privacy Enhanced Computation
Does Real Queryable Encryption mean there is a Fake Queryable Encryption?
TLDR There is no “fake” queryable encryption, but a certain NoSQL database provider has coined the term “Queryable Encryption”, and Baffle has something to say…
Baffle’s Proxy Architecture
Baffle implements database encryption and role-based access control using a reverse proxy configuration that operates at the SQL session layer. This blog will explore what that means and compare it to competing API and agent-based architectures.
Privacy Enhanced Computation Technologies Advantages and Disadvantages
Privacy enhanced computation technologies allow data teams to perform operations on encrypted data. In this blog post, we discussed various technologies.