PII in Vector Embeddings: A Defense Guide
Embeddings look like 'just numbers' — but recent research shows they're partially invertible. A practical defense guide for teams running vector stores against PII recovery attacks.
Building a Privacy-Aware RAG System
RAG pipelines have two distinct PII leak vectors: ingestion and inference. A defense-in-depth blueprint with code, using Philter, Philter AI Proxy, and the rest of the Philterd toolkit.