“Notes from our lab on cryptography, ML systems, and real-world deployments.”
Categories AI Engineering • Cryptography & zk • Security & Audits • Use-Cases • Policy/Ethics
Posts to Seed
“How to threat-model an AI-powered DApp”
“zk-SNARKs explained with a toy example”
“Deploying CV models on low-cost Android phones”
“Designing token incentives without Ponzi dynamics”
“Data governance for hospitals in emerging markets”