(no title)
aleden | 1 year ago
If they managed to do it, they should open-source the code. If they made a research breakthrough, they should publish. Doing either of those things would give me the peace of mind that I need.
aleden | 1 year ago
If they managed to do it, they should open-source the code. If they made a research breakthrough, they should publish. Doing either of those things would give me the peace of mind that I need.
sgammon|1 year ago
https://github.com/apple/swift-homomorphic-encryption
https://machinelearning.apple.com/research/homomorphic-encry...
https://www.apple.com/child-safety/pdf/Apple_PSI_System_Secu...
aleden|1 year ago
I take it that it is implicitly assumed that code running on the server (which I cannot spot the source for) doesn't need to be available, to be trusted? (That there's no way you could come up with an attack through cryptanalysis, involving what the server does, since the security of the data coming from the client is all that matters?)