Remix.run Logo
Foobar8568 5 hours ago

But you leak all type of information and and the retrieve either leak even more data or you'll end up with transferring a god knows amount of data or your encryption is trivially broken or spend days/month/years to unencrypt.

bilekas 5 hours ago | parent | next [-]

I don't know how you got these ideas but when you crack it, do make sure to write a post about it. Can't wait for that writeup.

Foobar8568 4 hours ago | parent [-]

LWE estimator isn't a proxy for this?

anon291 an hour ago | parent | prev [-]

Math literacy needs to become standard for computer scientists. These takes are so bad

Foobar8568 30 minutes ago | parent [-]

Or reading papers on the subjects, and playing with implementing FHE search.