Remix.run Logo
do_not_redeem a day ago

You're just describing ordinary challenge-response. That has nothing to do with homomorphic encryption and there are plenty of examples from before homomorphic encryption became viable, for example https://www.geoffchappell.com/notes/security/aim/index.htm

Homomorphic encryption hides data, not computation. If you've been trying to learn compsci from GPT, you might have fallen victim to hallucinations. I'd recommend starting from wikipedia instead. https://en.wikipedia.org/wiki/Homomorphic_encryption

And btw most games are cracked within a week of release. You have way too much faith in buzzwords and way too little faith in bored Eastern European teenagers.

dist-epoch 15 hours ago | parent [-]

> Homomorphic encryption hides data, not computation

Data is computation.

  x = challenge_byte ^ secret_key
  if x > 64:
    y = hash_memory_range()
  else:
    y = something_else()
  return sign(y, secret_key)
do_not_redeem 3 hours ago | parent [-]

That snippet has nothing to do with homomorphic encryption. It's just the same kind of challenge-response AIM and many others were already doing in the 90s.

You seem convinced that homomorphic encryption is some kind of magic that prevents someone from observing their own hardware, or from running Chrome under a debugger. That's just not true. And I suspect we don't share enough of a common vocabulary to have a productive discussion, so I'll end it here.