They get checked for, just like cyber security audits, to make sure that they are not privacy-harming, they are privacy-preserving. There’s mathematical properties -- I know Glenn is also looking into that -- called differential privacy, so you can show which epsilon is actually the acceptable range for people’s code to submit this way.

Keyboard shortcuts

j previous speech k next speech