Chapter 10. Frequently Asked Questions (and Their Answers!)

In this chapter, you’ll get a taste of commonly asked questions that I hear when I present these topics at conferences or meetings. In case you have an additional question, feel free to ping me on Twitter,1 on LinkedIn, or directly via Probably Private; I’ll keep a thread going with #PracticalPrivacyFAQs. If you publish your own FAQs or question and solution, please send it along so the community can learn and grow!

It’s best to treat this chapter as a handy reference for looking up questions as they surface. The index and table of contents will guide you if you need to reread sections that are relevant to a particular project, idea, or product. Such a list is never complete, but I hope this is comprehensive enough to address burning issues and also point you to additional learning.

The sections of this chapter are organized into topic areas, based on where the questions most often arise. These topics are: secure computation and confidential computing, data governance and data protection mechanisms, GDPR and regulations, and finally personal choices and social privacy.

Encrypted Computation and Confidential Computing

This section covers questions related to encrypted computation (sometimes called secure computation) methods and confidential computing, which you read about in Chapter 7.

Is Secure Computation Quantum-Safe?

Questions of quantum security comes up often if you talk with folks about cryptography; I find this ...

Get Practical Data Privacy now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.