| ▲ | Reptur 5 hours ago | |
If encrypted outputs can be viewed or used, they can be reverse-engineered through that same interface. FHE shifts the attack surface, it does not eliminate it. | ||
| ▲ | Chance-Device 4 hours ago | parent | next [-] | |
If you know how to reverse engineer weights or even hidden states through simple text output without logprobs I’d be interested in hearing about it. I imagine a lot of other people would be too. | ||
| ▲ | anon291 an hour ago | parent | prev [-] | |
I mean, no they cannot be viewed at any point once encrypted unless you have the key. That's the point. Even the intermediate steps are random gibberish unless you have the key | ||