Blog

Category: Privacy Enhanced Computation

Evening skyline

Baffle’s Proxy Architecture

Baffle implements database encryption and role-based access control using a reverse proxy configuration that operates at the SQL session layer. This blog will explore what that means and compare it to competing API and agent-based architectures.

Laptop icon with shield and padlock

Privacy Enhanced Computation Technologies Advantages and Disadvantages

Privacy enhanced computation technologies allow data teams to perform operations on encrypted data. In this blog post, we discussed various technologies.