In the realm of secure computation, we strive to achieve the impossible: to compute with data we cannot see.
The birth of the reader must be at the cost of the death of the Author.