privacy enhancing computation tools

Blind Data and Algorithm API

Simple integrations bring data and algorithms together for privacy-preserving analysis

The Blind Data and Algorithm API provides a simple-to-use set of libraries enabling users to bring data and algorithms together for collaborative analysis with configurable privacy policies enabled. With the right abstractions, you can leverage the power of privacy-enhancing computation techniques without distracting from your day-to-day.

No expert cryptography knowledge necessary!

How TripleBlind’s Blind Data and Algorithm API Works

Our API is responsible for routing traffic between entities, enforcing permissions, and documenting an audit trail of activity. Just a few lines of code added to the top of your Python or R scripts bring powerful privacy assurances to your data processes.

  • Do more with first- and third-party data 
  • Alleviate stress and headaches for your privacy and compliance teams

Everything you need to know
about TripleBlind in one place.

Connect and Protect

Digital Rights Managed

Digital rights management (DRM) is easier than ever 

  1. Administrators can set fine-grained controls over how their organization’s data and algorithm assets are used. 
  2. Permissions over data use can be managed at the attribute and record level. 
  3. Cryptographic consent is required from both parties (asset users and asset providers) for every operation.

Each party, whether a data provider or algorithm provider, hosts TripleBlind software locally or in their cloud environment. Various collaborating parties discover and connect with one another through the TripleBlind Router. The Router establishes connections and manages the digital rights policies, but steps aside to allow operations to occur in a peer-to-peer fashion.

TripleBlind Digital Rights Management (DRM)

No Need To Share Datasets or Algorithms

Data Stays Behind your Firewall

TripleBlind removes the need to share datasets or algorithms, which minimizes the risk of a counterparty leaking information or abusing usage agreements. They never hold the keys to access your assets in their raw state. Data users securely run remote calculations, queries, and machine learning model trainings on distributed data through the power of one-way transformations, also known as one-way encryption.

Data Remains Behind your Firewall

Maintain Data Utility

One-Way Encryption

Most privacy technologies alter datasets to remove sensitive elements so the dataset can be shared. The tradeoff is obvious: the more information you redact, the less utility the dataset has. TripleBlind solves this problem by enabling computation to occur on full, unaltered data while it remains cryptographically obfuscated. 

Other encryption methods need to generate a decryption key. TripleBlind’s approach, though, mathematically transforms data for a particular one-time operation, never generating or requiring a decryption key. 

This could take the form of a secure multi-party computation (SMPC) on shares of the data, or a federated approach seeded with meaningless noise. Whatever the approach, your computation remains secure and accurate. 

Even if the one-way encrypted data were intercepted, it would be irreversibly unintelligible to a malicious actor. And, we offer the same protections for algorithms!

One-way Encryption Lock with no keyhole

Know what’s being done with your data

Audit Everything

Most privacy technologies alter datasets to remove sensitive elements so the dataset can be shared. The tradeoff is obvious: the more information you redact, the less utility the dataset has. TripleBlind solves this problem by enabling computation to occur on full, unaltered data while it remains cryptographically obfuscated. 

Other encryption methods need to generate a decryption key. TripleBlind’s approach, though, mathematically transforms data for a particular one-time operation, never generating or requiring a decryption key. 

This could take the form of a secure multi-party computation (SMPC) on shares of the data, or a federated approach seeded with meaningless noise. Whatever the approach, your computation remains secure and accurate. 

Even if the one-way encrypted data were intercepted, it would be irreversibly unintelligible to a malicious actor. And, we offer the same protections for algorithms!

Book A Demo

TripleBlind keeps both data and algorithms in use private and fully computable. To learn more about Blind Learning, or to see it in action, please book a demo!

Blind Compute Icon

Blind Compute

Mathematical techniques and privacy primitives used to execute a myriad of computations.

Learn More

Blind Virtual Data Exchange API Icon

Blind Data & Algorithm API

Our method of securely connecting and managing processes performed with the solution.

Learn More

Blind Data Tools Icon

Blind Data Tools

Data science tools your teams expect, like pre- processing and EDA, designed around privacy.

Learn More

Blind AI Tools Icon

Blind AI Tools

AI model training and inference, on distributed private datasets.

Learn More

Blind Query Icon

Blind Query

Tools for learning from protected datasets without exposing private data.

Learn More

Blind Algorithm Tools Icon

Blind Algorithm Tools

Allow easy distribution of models while maintaining full control over your IP.

Learn More