TripleBlind User Guide

Getting Started

This guide introduces the fundamental concepts and instructions needed to get started with TripleBlind.

Overview

Every computer operation can be described as feeding data into an algorithm to get output. Algorithms can be simple or complex, but that is how computers have operated since they were conceived. The introduction of networks and the internet didn't change this basic formula. It allowed the input data to reside further away from the CPU running the algorithm and the output to be sent to different locations. With today's network speeds, the physical storage device that holds the data is less important and often unknown to ordinary users.

While the internet didn't change the conceptual operation of computers, it did introduce new security and legal challenges. With data being transmitted over an unknown sequence of physical links and intermediate storage devices, the chances of data being intercepted or leaked have increased.

Trusting other parties to protect your interests has proven inadequate. Whether through the intentional efforts of a bad actor or the unintentional vulnerabilities introduced by trusted partners, the result is the same: sensitive data is leaked. As a result, organizations must abide by complex regulations to operate on internal data when dealing with multinational scenarios. Collaboration with others can be expensive and difficult, and in some cases virtually impossible. TripleBlind enables collaboration on sensitive data without the need to trust a 3rd party or move data.

Architecture

The TripleBlind architecture consists of two primary components: the Router and Access Points. These components work together to enable collaboration between Organizations.

Routers

The TripleBlind Router changes the architecture of collaboration by acting as the coordinator between different parties. It indexes Datasets and Algorithms but never the actual data or code to be executed. These indexes can be searched, and the Router verifies security and authentication before a calculation begins.

Access Points

An Access Point is run by each Organization that wants to participate in the TripleBlind ecosystem. The Access Point runs on a computer or cloud instance that is completely controlled by the participant. It has two primary duties:

  • Provide computational resources for joint operations
  • Act as the encryption gatekeeper to the Organization's data

Each Access Point is registered with the Router and only individuals from that Organization are able to manage the Assets it protects. However, with permission, an Access Point can establish a connection with another Access Point to execute a single operation. Each operation requires explicit permission, and once it completes the operation, the connection is closed.