When a lot of computing devices are spread across a network and
how does one go about solving this issue? An attempt at tackling this issue can be found in this blog post here.
Another interesting issue is looking at the mathematical guarantees of privacy that can be ensured in such settings. A blog post about differential privacy will come soon!