
Raluca Ada Popa: how to train AI and keep your data confidential
The Robot Brains Podcast
How to Prevent an Attacker From Accessing Your Data on Your Phone
If you lose your phone and think somebody accessed it, then you basically call up your approval group. They could invalidate that key and trigger a new key to be created on your new phone. Your data being re-encrypted with that new key. So this is brief moment where it stays encrypted with the old key. And it's very quickly, essentially, decrypt, re-encrypt, and you're good to go.
00:00
Transcript
Play full episode
Remember Everything You Learn from Podcasts
Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.