Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

But you leak all type of information and and the retrieve either leak even more data or you'll end up with transferring a god knows amount of data or your encryption is trivially broken or spend days/month/years to unencrypt.


I don't know how you got these ideas but when you crack it, do make sure to write a post about it. Can't wait for that writeup.


LWE estimator isn't a proxy for this?


Math literacy needs to become standard for computer scientists. These takes are so bad


Or reading papers on the subjects, and playing with implementing FHE search.


Yeah it pretty clear that many people in the HN community have no idea what this is and yet they have takes. It makes me wonder...




Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: