aster.cloud aster.cloud
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
    • Learning
  • Tools
  • About
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
    • Learning
  • Tools
  • About
aster.cloud aster.cloud
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
    • Learning
  • Tools
  • About
  • Software
  • Solutions

Intel Solutions Help To Combat Modern Slavery

  • aster.cloud
  • November 28, 2022
  • 3 minute read

​What’s New: Intel, enterprise technology and services firm R3 and nonprofit Hope for Justice are working together to build a pilot application that enables organizations combatting modern slavery to confidently share sensitive data related to individual cases with the enhanced privacy protections offered by confidential computing. The Private Data Exchange, built for Hope for Justice, a nonprofit, nongovernmental organization working to end modern slavery and human trafficking, aggregates and analyzes data, then notifies the appropriate agencies when relevant data matches are identified.

“As security technology creators, we have both the responsibility and the opportunity to help protect every person’s data and privacy. We’re seeing this occur through confidential computing advancements – the innovations we are bringing forward today will help us facilitate change and soon become the standards for how we operate tomorrow.”

–Paul O’Neill, director of strategic business in Intel’s Confidential Computing Group

 


Partner with aster.cloud
for your next big idea.
Let us know here.



From our partners:

CITI.IO :: Business. Institutions. Society. Global Political Economy.
CYBERPOGO.COM :: For the Arts, Sciences, and Technology.
DADAHACKS.COM :: Parenting For The Rest Of Us.
ZEDISTA.COM :: Entertainment. Sports. Culture. Escape.
TAKUMAKU.COM :: For The Hearth And Home.
ASTER.CLOUD :: From The Cloud And Beyond.
LIWAIWAI.COM :: Intelligence, Inside and Outside.
GLOBALCLOUDPLATFORMS.COM :: For The World's Computing Needs.
FIREGULAMAN.COM :: For The Fire In The Belly Of The Coder.
ASTERCASTER.COM :: Supra Astra. Beyond The Stars.
BARTDAY.COM :: Prosperity For Everyone.

How It Works: Confidential computing enables encrypted data to be processed in memory while lowering the risk of exposing it to the rest of the system. It reduces the likelihood that the sensitive data of those affected by human trafficking will be compromised or misused.

Hope for Justice’s Private Data Exchange application takes advantage of the industry-leading security capabilities delivered by Intel® Software Guard Extensions (Intel® SGX), the security features built into 3rd and 4th generation Intel® Xeon® Scalable processors. These features are designed to help provide protection for data-in-use, independent of the cloud provider, operating system or hardware configuration. They also enable multiple organizations to collaborate on shared analyses and validate algorithms while shielding confidential or regulated data from other parties.

Read More  Cohere And Google Cloud Announce Multi-Year Technology Partnership

“Human traffickers are exploiting new technology and globalization at a staggering scale and pace. Most trafficking is now facilitated via the internet and other digital technologies that pay little attention to borders or jurisdictions,” said Tim Nelson, CEO of Hope for Justice. “We cannot lose the technology race against human trafficking. That is why we are so pleased that the Private Data Exchange platform has the potential to revolutionize how the sector collaborates across borders and tackles issues surrounding data privacy and confidentiality. For the first time, civil society, governments, U.N. agencies and businesses can truly collaborate to make technology a force that will help to end human trafficking.”

By leveraging the built-in security and attestation features of Intel SGX and R3’s Conclave platform, the application can provide organizations with confidence that information on slavery victims or those seeking to help them are better protected from their data being exposed. Conclave provides the tools necessary for organizations to run code without the burden of managing a complex infrastructure, putting the power of Intel SGX into the hands of developers and enabling them to write privacy-first applications with ease. This combination opens new possibilities for organizations seeking to benefit from the enhanced security of confidential cloud computing.

Why It Matters: Globally, organizations working on human trafficking cases have collected large pools of valuable data on both victims of slavery and perpetrators, as well as contextual information relating to emerging patterns and trends. Given the data’s sensitivity, there is a reluctance to collaborate on sharing, meaning maintaining high security and compliance is mission critical. To reap the benefits of collaboration, each organization must utilize trustworthy security solutions that help keep data confidential and private, and aid in ensuring the data’s integrity.

Read More  Intel Innovation: Cloud-Edge Infrastructure News

Confidentially matched information will enable participating organizations such as nonprofits, national actors and intergovernmental agencies to realize tangible outcomes in the fight against slavery and enable victims of human trafficking and modern slavery to be better identified, rescued and provided the services they need. For instance:

  • Perpetrator name matching: If the same person appears in multiple matches, they may be involved in numerous cases of trafficking and be a serial offender or part of organized crime. The appropriate group can begin an investigation or notify law enforcement.
  • Victim family name matching: Discovering the same surname in multiple cases may indicate that two or more family members have been trafficked separately. Linking the two cases may accelerate rescue and help reunite the family.
  • Address matching: If the same property keeps showing up in results, it may be owned or operated by perpetrators or criminal organizations. This can be enough to trigger an investigation.
  • Lower-level contextual matching: If information, like location and industry, doesn’t present an active investigation opportunity, it can still reveal critical trends and trigger future outreach efforts.

Overcoming many of the obstacles to data sharing enables Hope for Justice to prepare to use the Private Data Exchange in consortium with national and intergovernmental stakeholders in direct response to the ongoing humanitarian crisis in Europe. The increased prevalence of human trafficking is a critical moment for both innovation and intervention, and this is an example of how technology plays a part.


For enquiries, product placements, sponsorships, and collaborations, connect with us at [email protected]. We'd love to hear from you!

Our humans need coffee too! Your support is highly appreciated, thank you!

aster.cloud

Related Topics
  • Conclave
  • Hope for Justice
  • Intel
  • R3
  • Slavery
  • Software Guard Extensions
You May Also Like
oracle-ibm
View Post
  • Solutions
  • Technology

Google Cloud and Philips Collaborate to Drive Consumer Marketing Innovation and Transform Digital Asset Management with AI

  • May 20, 2025
View Post
  • Software
  • Technology

Canonical Releases Ubuntu 25.04 Plucky Puffin

  • April 17, 2025
View Post
  • Software
  • Technology

IBM Accelerates Momentum in the as a Service Space with Growing Portfolio of Tools Simplifying Infrastructure Management

  • March 27, 2025
Vehicle manufacturing
View Post
  • Software

IBM Study: Vehicles Believed to be Software Defined and AI Powered by 2035

  • December 12, 2024
aster-cloud-tux-gaming
View Post
  • Computing
  • Gears
  • Software

5 best Linux distributions for gamers in 2024

  • September 11, 2024
Crab
View Post
  • Gears
  • Learning
  • Software

The Best Friends for a Rustacean. Top Books in Learning Rust.

  • August 25, 2024
Coffee | Laptop | Notebook | Work
View Post
  • Software

The Hidden Economy Of Open Source Software

  • April 28, 2024
Redis logo
View Post
  • Platforms
  • Software

Redis Moves To Source-Available Licenses

  • April 2, 2024

Stay Connected!
LATEST
  • 1
    Just make it scale: An Aurora DSQL story
    • May 29, 2025
  • 2
    Reliance on US tech providers is making IT leaders skittish
    • May 28, 2025
  • Examine the 4 types of edge computing, with examples
    • May 28, 2025
  • AI and private cloud: 2 lessons from Dell Tech World 2025
    • May 28, 2025
  • 5
    TD Synnex named as UK distributor for Cohesity
    • May 28, 2025
  • Weigh these 6 enterprise advantages of storage as a service
    • May 28, 2025
  • 7
    Broadcom’s ‘harsh’ VMware contracts are costing customers up to 1,500% more
    • May 28, 2025
  • 8
    Pulsant targets partner diversity with new IaaS solution
    • May 23, 2025
  • 9
    Growing AI workloads are causing hybrid cloud headaches
    • May 23, 2025
  • Gemma 3n 10
    Announcing Gemma 3n preview: powerful, efficient, mobile-first AI
    • May 22, 2025
about
Hello World!

We are aster.cloud. We’re created by programmers for programmers.

Our site aims to provide guides, programming tips, reviews, and interesting materials for tech people and those who want to learn in general.

We would like to hear from you.

If you have any feedback, enquiries, or sponsorship request, kindly reach out to us at:

[email protected]
Most Popular
  • Understand how Windows Server 2025 PAYG licensing works
    • May 20, 2025
  • By the numbers: How upskilling fills the IT skills gap
    • May 21, 2025
  • 3
    Cloud adoption isn’t all it’s cut out to be as enterprises report growing dissatisfaction
    • May 15, 2025
  • 4
    Hybrid cloud is complicated – Red Hat’s new AI assistant wants to solve that
    • May 20, 2025
  • 5
    Google is getting serious on cloud sovereignty
    • May 22, 2025
  • /
  • Technology
  • Tools
  • About
  • Contact Us

Input your search keywords and press Enter.