Tim Mahoney

(replying to Saagar Jha)

@saagar from what I gather, part of the hard problem here is running the code in an environment that is protected from peeking at the data even while the execution is in progress. Basically like Intel SGX, but not compromised.

The write up mentions the Secure Enclave. Maybe Apple figured it out?

Mark Pauley

(replying to Tim Mahoney)

@_tim______ @saagar I am assuming that if you cannot cryptographically guarantee the actual topology of the hardware it’s running on then you can never be 100% secure if Alice can’t even trust Bob. Maybe with homomorphic encryption?

Light

(replying to Mark Pauley)

@unsaturated @_tim______ @saagar
>Maybe with homomorphic encryption?
That's what I assumed was being talked about at first.

Mark Pauley

(replying to Light)

@light @_tim______ @saagar I’ve heard HE basically doesn’t work :tiredcat: