A (late) Layman’s Overview of the Technology Behind Apple’s CSAM Detection Post date July 3, 2025 Post author By Thomas Weilbach Post categories In apple, cryptography, csam-detection, explainer, how-does-csam-work, internet-privacy, layman-guide, privacy-preserving-technology
What I’ve Learned (and Broken) Building Zero-Knowledge Applications Post date January 12, 2025 Post author By hackernoon Post categories In anonymous-verification, blockchain-technology, cryptographic-proofs, privacy-preserving-technology, software engineering, zero-knowledge-applications, zero-knowledge-proofs, zk-debugging