Cryptographic protection of ML models

Imagine a system that operates with ML models. These models are unique and work with user-generated content better than anyone else.

Imagine a system that operates with ML models. These models are unique and work with user-generated content better than anyone else.

Maintaining cross-platform cryptographic library is a journey full of unexpected bugs, language-specific hacks, difficult decisions and endless struggle to make developer-facing APIs easy-to-use and hard-to-misuse.

The real case about Bear note taking the app that decided to implement convenient note encryption and note locking for their existing user base.