Blog
Category: Privacy Enhanced Computation
Baffle’s Proxy Architecture
Baffle implements database encryption and role-based access control using a reverse proxy configuration that operates at the SQL session layer. This blog will explore what that means and compare it to competing API and agent-based architectures.
Privacy Enhanced Computation Technologies Advantages and Disadvantages
Privacy enhanced computation technologies allow data teams to perform operations on encrypted data. In this blog post, we discussed various technologies.