“Notes from our lab on cryptography, ML systems, and real-world deployments.”

Categories AI Engineering • Cryptography & zk • Security & Audits • Use-Cases • Policy/Ethics

Posts to Seed

“How to threat-model an AI-powered DApp”

“zk-SNARKs explained with a toy example”

“Deploying CV models on low-cost Android phones”

“Designing token incentives without Ponzi dynamics”

“Data governance for hospitals in emerging markets”