Privacy-enhancing technologies offer a broad spectrum of solutions for challenges related to data confidentiality. However, understanding the domain of application for PETs - where they will be most useful, how they interact and which PET to select for a given privacy challenge - requires careful consideration. In this document, we provide an overview of different PETs and compare approaches to protecting data-in-use, a task for which TEEs, FHE, DP and SMPC are often considered.
Topics:




