<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[The Cyber Solicitor: Privacy Engineering]]></title><description><![CDATA[Everything on privacy engineering]]></description><link>https://www.thecybersolicitor.com/s/privacy-engineering</link><image><url>https://substackcdn.com/image/fetch/$s_!T4HV!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F276409e9-b16f-4458-aae2-f3c59c484ed3_1110x1110.png</url><title>The Cyber Solicitor: Privacy Engineering</title><link>https://www.thecybersolicitor.com/s/privacy-engineering</link></image><generator>Substack</generator><lastBuildDate>Thu, 07 May 2026 13:08:50 GMT</lastBuildDate><atom:link href="https://www.thecybersolicitor.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Mahdi Assan]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[thecybersolicitor@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[thecybersolicitor@substack.com]]></itunes:email><itunes:name><![CDATA[Mahdi Assan]]></itunes:name></itunes:owner><itunes:author><![CDATA[Mahdi Assan]]></itunes:author><googleplay:owner><![CDATA[thecybersolicitor@substack.com]]></googleplay:owner><googleplay:email><![CDATA[thecybersolicitor@substack.com]]></googleplay:email><googleplay:author><![CDATA[Mahdi Assan]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[How homomorphic encryption works]]></title><description><![CDATA[A new solution shared by Apple for processing encrypted data without decrypting it]]></description><link>https://www.thecybersolicitor.com/p/how-homomorphic-encryption-works</link><guid isPermaLink="false">https://www.thecybersolicitor.com/p/how-homomorphic-encryption-works</guid><dc:creator><![CDATA[Mahdi Assan]]></dc:creator><pubDate>Fri, 22 Nov 2024 09:01:01 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!ZWpv!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3740a151-344c-48fc-9bcc-0892aa98c81c_1794x990.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h1>What is homomorphic encryption</h1><p>Homomorphic encryption (HE) is a solution for performing functions on encrypted data <em>without</em> decrypting it.</p><p>To quote a previous post of mine explaining how encryption works:</p><blockquote><p>...encryption is a method for transforming data from one format into another. The way encryption does this makes it a common security measure across diff&#8230;</p></blockquote>
      <p>
          <a href="https://www.thecybersolicitor.com/p/how-homomorphic-encryption-works">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[A quick guide to differential privacy]]></title><description><![CDATA[One method for privacy-preserving machine learning]]></description><link>https://www.thecybersolicitor.com/p/a-quick-guide-to-differential-privacy</link><guid isPermaLink="false">https://www.thecybersolicitor.com/p/a-quick-guide-to-differential-privacy</guid><dc:creator><![CDATA[Mahdi Assan]]></dc:creator><pubDate>Fri, 04 Oct 2024 08:01:32 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1979ade9-e5ba-4d33-ab41-09b45838d29a_860x633.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h1>TL;DR</h1><p>This newsletter is about differential privacy. It looks at what it is, how it works and some practical applications of this solution, including for the development of machine learning models.</p><p>Here are the key takeaways:</p><ul><li><p>Differential privacy is about quantifying the information leakage of an algorithm. This leakage is measured by using the algorithm i&#8230;</p></li></ul>
      <p>
          <a href="https://www.thecybersolicitor.com/p/a-quick-guide-to-differential-privacy">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[What a VPN does and does not do]]></title><description><![CDATA[A quick guide to virtual private networks]]></description><link>https://www.thecybersolicitor.com/p/what-a-vpn-does-and-does-not-do</link><guid isPermaLink="false">https://www.thecybersolicitor.com/p/what-a-vpn-does-and-does-not-do</guid><dc:creator><![CDATA[Mahdi Assan]]></dc:creator><pubDate>Fri, 24 May 2024 08:01:51 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!TopY!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7fee7381-cf7b-469a-ad52-d4a283bfd9d5_2157x1668.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Virtual private networks (VPN) are applications that protect the internet connections made from your device. It does so in the following two ways:</p><ol><li><p>Encrypting your internet connections</p></li><li><p>Hiding your IP address</p></li></ol><p>To use a VPN, you can install software (i.e., a VPN client) from a VPN service provider. The client connects to the VPN server of the provider, and bot&#8230;</p>
      <p>
          <a href="https://www.thecybersolicitor.com/p/what-a-vpn-does-and-does-not-do">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[A very basic introduction to encryption]]></title><description><![CDATA[A short and simple primer on an important security measure]]></description><link>https://www.thecybersolicitor.com/p/a-very-basic-introduction-to-encryption</link><guid isPermaLink="false">https://www.thecybersolicitor.com/p/a-very-basic-introduction-to-encryption</guid><dc:creator><![CDATA[Mahdi Assan]]></dc:creator><pubDate>Fri, 10 May 2024 08:01:22 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/cfd90f93-4425-43e9-a583-e1535ca9fe2d_4132x2755.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Simply put, encryption is a method for transforming data from one format into another. The way encryption does this makes it a common security measure across different computer systems.</p><p>Encryption involves three main elements:</p><ol><li><p>The plaintext</p></li><li><p>A cipher</p></li><li><p>A key</p></li><li><p>An algorithm</p></li><li><p>The cipher text</p></li></ol><p>Encryption takes plaintext (i.e., the data to be encrypted), and applies an a&#8230;</p>
      <p>
          <a href="https://www.thecybersolicitor.com/p/a-very-basic-introduction-to-encryption">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[AI can unlearn what it has learned]]></title><description><![CDATA[A potential solution for the right to be forgotten regarding language models]]></description><link>https://www.thecybersolicitor.com/p/ai-can-unlearn-what-it-has-learned</link><guid isPermaLink="false">https://www.thecybersolicitor.com/p/ai-can-unlearn-what-it-has-learned</guid><dc:creator><![CDATA[Mahdi Assan]]></dc:creator><pubDate>Fri, 22 Mar 2024 09:01:28 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!miiU!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F46b89202-3794-4769-bb34-720e0c6f3295_1087x574.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h1>TL;DR</h1><p>This newsletter is about machine unlearning. It looks a potential implementation of this that could be used to comply with data protection law.</p><p>Here are the key takeaways:</p><ul><li><p>Training data extraction attacks reveal the personal data contained in the web-scraped datasets that LLMs like ChatGPT are trained on.</p></li><li><p>Using personal data for training requires a su&#8230;</p></li></ul>
      <p>
          <a href="https://www.thecybersolicitor.com/p/ai-can-unlearn-what-it-has-learned">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Notes on E2EE and Client-Side Scanning]]></title><description><![CDATA[A look at the risks of scanning messages on devices in E2EE environments]]></description><link>https://www.thecybersolicitor.com/p/notes-on-e2ee-and-client-side-scanning</link><guid isPermaLink="false">https://www.thecybersolicitor.com/p/notes-on-e2ee-and-client-side-scanning</guid><dc:creator><![CDATA[Mahdi Assan]]></dc:creator><pubDate>Sat, 05 Aug 2023 13:11:20 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ef3a60d-2d6f-4364-a2ae-49cf6c1db1a4_4366x3086.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h1>Intro</h1><p>These are my notes on end-to-end encryption (E2EE) and <a href="https://arxiv.org/pdf/2110.07450.pdf">Bugs in Our Pockets</a>, a paper on the risks of client-side scanning (CSS). The authors of this paper include some well-known experts and researchers in the cryptography space; one of them, for example, is Whitfield Diffie, who is one of the creators of the Diffie-Hellman key exchange protocol (al&#8230;</p>
      <p>
          <a href="https://www.thecybersolicitor.com/p/notes-on-e2ee-and-client-side-scanning">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Hash-based tools for content moderation]]></title><description><![CDATA[A method for detecting illicit content on social media platforms]]></description><link>https://www.thecybersolicitor.com/p/hash-based-tools-for-content-moderation</link><guid isPermaLink="false">https://www.thecybersolicitor.com/p/hash-based-tools-for-content-moderation</guid><dc:creator><![CDATA[Mahdi Assan]]></dc:creator><pubDate>Fri, 21 Apr 2023 20:49:12 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2378d5c7-9248-4bbc-9316-1b2cd04ffbf3_4366x3086.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h1>TL;DR</h1><p>This post explores how hash-based detection tools work and how they are used for content moderation on internet platforms.</p><p>In a previous post I explained what content moderation is and given an overview of how it generally works across different internet platforms:</p><blockquote><p>Content moderation is where an internet platforms reviews content or communications on&#8230;</p></blockquote>
      <p>
          <a href="https://www.thecybersolicitor.com/p/hash-based-tools-for-content-moderation">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[New Law #2: The Privacy Engineer]]></title><description><![CDATA[Who they are, what they do and their role in modern data protection compliance]]></description><link>https://www.thecybersolicitor.com/p/new-law-2-the-privacy-engineer</link><guid isPermaLink="false">https://www.thecybersolicitor.com/p/new-law-2-the-privacy-engineer</guid><dc:creator><![CDATA[Mahdi Assan]]></dc:creator><pubDate>Fri, 13 Mar 2020 21:33:02 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!qIvm!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd2f7da4-01b5-4fc1-bb34-36d073d54e10_2338x1652.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!qIvm!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd2f7da4-01b5-4fc1-bb34-36d073d54e10_2338x1652.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!qIvm!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd2f7da4-01b5-4fc1-bb34-36d073d54e10_2338x1652.jpeg 424w, https://substackcdn.com/image/fetch/$s_!qIvm!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd2f7da4-01b5-4fc1-bb34-36d073d54e10_2338x1652.jpeg 848w, https://substackcdn.com/image/fetch/$s_!qIvm!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd2f7da4-01b5-4fc1-bb34-36d073d54e10_2338x1652.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!qIvm!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd2f7da4-01b5-4fc1-bb34-36d073d54e10_2338x1652.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!qIvm!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd2f7da4-01b5-4fc1-bb34-36d073d54e10_2338x1652.jpeg" width="1456" height="1029" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/cd2f7da4-01b5-4fc1-bb34-36d073d54e10_2338x1652.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1029,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!qIvm!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd2f7da4-01b5-4fc1-bb34-36d073d54e10_2338x1652.jpeg 424w, https://substackcdn.com/image/fetch/$s_!qIvm!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd2f7da4-01b5-4fc1-bb34-36d073d54e10_2338x1652.jpeg 848w, https://substackcdn.com/image/fetch/$s_!qIvm!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd2f7da4-01b5-4fc1-bb34-36d073d54e10_2338x1652.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!qIvm!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd2f7da4-01b5-4fc1-bb34-36d073d54e10_2338x1652.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>One of the keys to the effective implementation of a privacy programme within an organisation is &#8216;the company buy-in&#8217;; getting stakeholders to believe in the programme and contribute to its success. To do this, some may cite the fines imposed for non-compliance, particularly under the <a href="https://www.infosecurity-magazine.com/news/ico-fines-cathay-pacific-500000/">GDPR</a>. However, with such an approach, the impression that one may dev&#8230;</p>
      <p>
          <a href="https://www.thecybersolicitor.com/p/new-law-2-the-privacy-engineer">
              Read more
          </a>
      </p>
   ]]></content:encoded></item></channel></rss>