Blaze@lemmy.zip to Privacy@lemmy.dbzer0.com · 2 months agoLet’s talk about AI and end-to-end encryptionblog.cryptographyengineering.comexternal-linkmessage-square6fedilinkarrow-up115arrow-down11cross-posted to: pulse_of_truth@infosec.pubprivacy@lemmy.mlhackernews@lemmy.bestiver.sepulse_of_truth@infosec.pub
arrow-up114arrow-down1external-linkLet’s talk about AI and end-to-end encryptionblog.cryptographyengineering.comBlaze@lemmy.zip to Privacy@lemmy.dbzer0.com · 2 months agomessage-square6fedilinkcross-posted to: pulse_of_truth@infosec.pubprivacy@lemmy.mlhackernews@lemmy.bestiver.sepulse_of_truth@infosec.pub
minus-squaresunzu2@thebrainbin.orglinkfedilinkarrow-up2·2 months agoif you have LLM with full permissions on your end point, then end to end encryption is useless whoever controls your LLM.
if you have LLM with full permissions on your end point, then end to end encryption is useless whoever controls your LLM.