(Insider Story)

Read the original article: Secure multiparty computation explained: Ensuring trust in untrustworthy environments