122
you are viewing a single comment's thread
view the rest of the comments
[-] t3rmit3@beehaw.org 1 points 3 days ago

For those interested, the reason it’s not the same as a backdoor is that the result of the computation done on HE data is itself still encrypted and readable only by the original owner. So you can effectively offload the work of a certain analysis to a server that you don’t actually trust with your keys.

Do iPhones have a BYOK system for people to supply their own keypairs? Or is their OS open-source so that people can see how the keys are being handled? Because if not, it just sounds like all it takes to break this is for Apple's OS that it controls to ship the private keys that it generated up to its servers?

this post was submitted on 06 Jan 2025
122 points (100.0% liked)

Technology

37831 readers
254 users here now

A nice place to discuss rumors, happenings, innovations, and challenges in the technology sphere. We also welcome discussions on the intersections of technology and society. If it’s technological news or discussion of technology, it probably belongs here.

Remember the overriding ethos on Beehaw: Be(e) Nice. Each user you encounter here is a person, and should be treated with kindness (even if they’re wrong, or use a Linux distro you don’t like). Personal attacks will not be tolerated.

Subcommunities on Beehaw:


This community's icon was made by Aaron Schneider, under the CC-BY-NC-SA 4.0 license.

founded 2 years ago
MODERATORS