logoalt Hacker News

Repturtoday at 4:43 PM2 repliesview on HN

If encrypted outputs can be viewed or used, they can be reverse-engineered through that same interface. FHE shifts the attack surface, it does not eliminate it.


Replies

Chance-Devicetoday at 5:22 PM

If you know how to reverse engineer weights or even hidden states through simple text output without logprobs I’d be interested in hearing about it. I imagine a lot of other people would be too.

anon291today at 7:51 PM

I mean, no they cannot be viewed at any point once encrypted unless you have the key. That's the point. Even the intermediate steps are random gibberish unless you have the key