Audrey Tang

Zero knowledge proofs, fully homomorphic encryptions, split learning, if you have to use deep learning, and things like that that are provably private or provably secrecy keeping. Differential privacy is a good example.