Privacy by design P2P search including IoT
Decentralized solutions (including blockchain and distributed ledger technologies)
By
Search and discovery inside mesh/adhoc networks
By
Real-time collaboration between several, distributed LibreOffice instances
By
Privacy-Preserving Sharing of Threat Intelligence in Trusted Adversarial Environments
By
Collaboration infrastructure with near real-time p2p data synchronization

