All Articles

Unveiling Graph Structures in Microservices: Service Dependency Graph, Call Graph, and Causal Graph

Unveiling Graph Structures in Microservices: Service Dependency Graph, Call Graph, and Causal Graph

The rise of service-oriented architecture (SOA) and microservices architecture has led to a major …

Cache Me If You Can: Taming the Caching Complexity of Microservice Call Graphs

Cache Me If You Can: Taming the Caching Complexity of Microservice Call Graphs

As microservices architectures have become increasingly common in modern software systems, they have …

Privacy Engineering: Why Standards Are Still Out of Reach?

Privacy Engineering: Why Standards Are Still Out of Reach?

In contemporary technology environments, organisations are increasingly challenged with the …

 Policy Zones: Purpose Limitation at Scale using Information Flow Control

Policy Zones: Purpose Limitation at Scale using Information Flow Control

At the heart of privacy lies the principle of purpose limitation, dictating that data should only be …

Deploying Hugo Sites on Cloudflare Pages with Decap CMS and GitHub Backend

Deploying Hugo Sites on Cloudflare Pages with Decap CMS and GitHub Backend

Recently I migrated this website from Ghost to Hugo. This site is now generated by Hugo, stored by …

Differential Privacy: 6 Key Equations Explained

Differential Privacy: 6 Key Equations Explained

Differential Privacy is a powerful framework for ensuring privacy in data analysis by adding …

Archiving with The Rogue Scholar

Archiving with The Rogue Scholar

Since 2009, I have published over 125 articles on this blog, creating a space where my work …

Input vs Output Privacy

Input vs Output Privacy

Privacy in data systems has traditionally focused on protecting sensitive information as it enters a …

Birds of a Feather Leak Together: The Set Bias Privacy Problem

Birds of a Feather Leak Together: The Set Bias Privacy Problem

Secure multi-party computation (SMPC) enables organisations to collaborate on sensitive data …