I have something to talk about in the air - privacy computing

insert image description here
The topic creator’s point of view is
that the word privacy computing is very popular now. One of the reasons for raising this topic is to popularize relevant knowledge and tell everyone what privacy computing can do; the second is to understand everyone’s real needs. What is the scenario, what direction does privacy computing need to continue to go, and what to do.

What did the staff say?
Blue Bones
As far as individuals are concerned, any information that we are unwilling to disclose should be regarded as personal privacy. I think the definition of privacy can be divided into basic information privacy and behavioral information privacy. Basic information privacy includes, our phone number, our income, marital status, home address and so on. Behavior information privacy refers to the information generated by behavior, including our search records, our speech on the Internet, where we have been, etc. Because privacy is violated, we face various problems in our life. For example, as long as there is a search behavior, many subsequent content pushes are related to this behavior; after the bank has a loan record, calls from various wild loan platforms come; Leaks, etc., need to be improved.

For individuals
, sensitive personal information is private, such as mobile phone numbers, various documents, travel trajectories, shopping records, chat content, medical information, personal property, and so on. For enterprises, various information, enterprise financial status and so on. In life, it is very common for personal information to be leaked: for example, when you buy a house, you will receive a lot of decoration calls and intermediary calls. If you have a child, you will receive various training and counseling classes. After searching for a product/service on the website, you will see relevant advertisements on various other platforms...

User_1616284799 
I think personal information that I don’t want others to know or is inconvenient for others to know is considered privacy, such as: height, weight, medical history, physical defects, health status, life experience, property status, marriage, family, social relationship, hobbies, and Our various traces on the Internet, account passwords, network disk photos, shopping records, web browsing records...

And Ting Fengyin 
's personal taxes, social security and bank consumption records are all private data. By using the federated learning technology in privacy computing, it is possible to combine personal privacy data from multiple data sources and establish a federated learning model to provide individuals with better consumption and financial services. For example, under the premise of not disclosing personal privacy data, federated learning modeling can be carried out based on private data such as consumption records, consumption preferences, browsing records, taxation and social security, to make more accurate personalized product and service recommendations for individuals, and to provide more Excellent buying experience.

Big cat 
has too much privacy, such as my address book, text messages, device numbers, IP addresses, chat records, common words, common software, browsing records, search records, shopping information, preferences, addresses, etc., are all covered by big data Snooping, being packaged as a commodity for trading, the most terrible thing is that it knows itself better than myself, but this is not what we hope.

According to Sun Wei 
's medical insurance plan, according to your occupational risks, we recommend you to purchase additional hair transplant insurance to achieve freedom of hairstyle. Considering that you have a part-time online car-hailing situation after get off work, your lumbar disc herniation additional insurance premium will increase by 15%. In addition, your company is too involuntary and has too many 996s, so it cannot handle life insurance business for you.

Zhang Shenbin 
uses a lot of proof materials in his life, such as income proof, proof of participation, property proof, protect personal privacy data through privacy calculation and cryptography technology, and at the same time prove that he really meets the conditions, similar to paper proofs. Digitally smeared away. Data is the production factor of the digital economy, but since most enterprise data is confidential, data cannot be shared. Privacy computing can open up data islands, only obtain the right to use the data, not the details of the data. Privacy computing can make data available and invisible among participants in terms of data statistics, AI model training, and secure computing, thereby promoting the wider use of data assets.

Guess you like

Origin blog.csdn.net/juhedata/article/details/126766345