2025-03-12 13:52

Block Media

Image source: Block Media
# AI Data Summit Discusses Enhancements in Privacy and Security for Data Sovereignty
At the AI Data Summit hosted by VANA, discussions centered on enhancing privacy and security for data sovereignty. The panel discussion on March 7 addressed infrastructure development, trust issues in a user-owned data economy, and advancements in security technologies.
The panel included Aayush Gupta, founder and CEO of ZK Email; David Sneider, co-founder and CEO of Lit Protocol; Daniel Marzec, product lead at Flashbots L2; and Chris Rinard, CTO of Open Data Labs. The session was moderated by Liz Harkavy, a partner at A16z.
David Sneider from Lit Protocol emphasized that "true privacy is not just about hiding data but allowing users to have complete control over their data." He explained that in the traditional Web 2.0 environment, data is stored on company servers and managed with encryption, yet users lack true control. Conversely, Web 3.0 leverages decentralized networks and cryptographic methods, empowering users to manage their own data.
Daniel Marzec, product lead at Flashbots, stated, "Privacy is essential for creating efficient markets," and stressed that "trust-based data storage and processing are even more crucial in a decentralized environment." He noted that various privacy-protection technologies are being researched for Ethereum and Layer 2 networks and are exploring expansion into Web 2.0 environments.
# Emphasis on TEE and ZK Roles
The panel highlighted TEE (Trusted Execution Environment) and ZK (Zero-Knowledge Proof) as key technologies for building a trusted data environment. TEE is a hardware-based security technology that protects data from external attacks, while ZK is a cryptographic method that proves integrity without exposing data directly.
Aayush Gupta, founder of ZK Email, stated, "ZK plays a critical role in verifying the origin and validity of data," emphasizing the need for technology that proves data authenticity while protecting personal information.
David Sneider mentioned, "Lit Protocol adopts a combined approach of TEE and ZK technologies," explaining that the dual security layers are crucial for minimizing the risk of data manipulation by centralized entities.
# Establishing Data Sovereignty and Enhancing User Experience
In the latter part of the discussion, the concept of data sovereignty and the tasks required to achieve it were debated. The panelists explained that data sovereignty consists of data ownership, user control, and transparency, with the core being empowering users to make decisions about their data.
Chris Rinard, CTO of Open Data Labs, noted, "To ultimately realize data sovereignty, technological advancements need to go hand in hand with improvements in user experience." He emphasized that "no matter how advanced privacy protection technologies become, they need to be accessible to everyday users to drive actual change."
In conclusion, the panelists projected that "data sovereignty in Web 3.0 must evolve beyond a mere concept to genuinely enhance user experiences," contending that "an environment where data sovereignty is guaranteed will lead to a better internet experience."
View original content to download multimedia: https://www.blockmedia.co.kr/archives/871265