(no title)
koutetsu | 1 year ago
You should instead try looking into Homomorphic Encryption:
https://huggingface.co/blog/encrypted-llm
It is resource intensive and slower but it serves your purpose better, in my opinion.
koutetsu | 1 year ago
You should instead try looking into Homomorphic Encryption:
https://huggingface.co/blog/encrypted-llm
It is resource intensive and slower but it serves your purpose better, in my opinion.
manili|1 year ago
I know about FHE and TFHE, but as you said, they need a lot of computational resources.
Ignoring the training process and just looking at inference, what are the "technical" drawbacks of this idea? If the first and last layers of the network run on the local machine, how could a malicious cloud reverse engineer the inputs and discover the raw data?