logoalt Hacker News

puttycattoday at 9:46 AM1 replyview on HN

> Every request is end-to-end encrypted

Afaik you will need to decrypt the data the moment it needs to be fed into the model.

How do they do this then?


Replies

mr_mitmtoday at 10:42 AM

The system hosting the model must be one of the ends.

Remember, all encryption is E2EE if you're not picky about the ends.