frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

Fully homomorphic encryption and the dawn of a private internet

https://bozmen.io/fhe
186•barisozmen•5h ago•52 comments

When Root Meets Immutable: OpenBSD Chflags vs. Log Tampering

https://rsadowski.de/posts/2025/openbsd-immutable-system-logs/
8•todsacerdoti•41m ago•3 comments

NIH is cheaper than the wrong dependency

https://lewiscampbell.tech/blog/250718.html
157•todsacerdoti•6h ago•84 comments

Linux and Secure Boot certificate expiration

https://lwn.net/SubscriberLink/1029767/08f1d17c020e8292/
70•pabs3•5h ago•45 comments

ChatGPT agent: bridging research and action

https://openai.com/index/introducing-chatgpt-agent/
573•Topfi•16h ago•386 comments

Mistral Releases Deep Research, Voice, Projects in Le Chat

https://mistral.ai/news/le-chat-dives-deep
532•pember•18h ago•112 comments

My favorite use-case for AI is writing logs

https://newsletter.vickiboykis.com/archive/my-favorite-use-case-for-ai-is-writing-logs/
186•todsacerdoti•9h ago•122 comments

Arva AI (YC S24) Is Hiring an AI Research Engineer (London, UK)

https://www.arva.ai/careers/ai-research-engineer
1•OliverWales•1h ago

The End of Windows 10: a toolkit for community repair groups

https://therestartproject.org/end-of-windows-10-toolkit-for-repair-groups/
33•T-A•3d ago•38 comments

Data on How America Sold Out Its Computer Science Graduates

https://ifspp.substack.com/p/data-on-how-america-sold-out-its
45•haskellandchill•5h ago•20 comments

My experience with Claude Code after two weeks of adventures

https://sankalp.bearblog.dev/my-claude-code-experience-after-2-weeks-of-usage/
255•dejavucoder•14h ago•197 comments

Perfume reviews

https://gwern.net/blog/2025/perfume
226•surprisetalk•1d ago•119 comments

Hand: open-source Robot Hand

https://github.com/pollen-robotics/AmazingHand
379•vineethy•21h ago•100 comments

TCP-in-UDP Solution (eBPF)

https://blog.mptcp.dev/2025/07/14/TCP-in-UDP.html
19•todsacerdoti•3d ago•4 comments

Extending That XOR Trick to Billions of Rows

https://nochlin.com/blog/extending-that-xor-trick
54•hundredwatt•3d ago•6 comments

Claude Code Unleashed

https://ymichael.com/2025/07/15/claude-code-unleashed
83•ymichael•2d ago•45 comments

DIY Telescope Mods That Transformed My Astrophotography

https://www.youtube.com/watch?v=Efmzr_K4ApQ
12•karlperera•3d ago•1 comments

Self-taught engineers often outperform (2024)

https://michaelbastos.com/blog/why-self-taught-engineers-often-outperform
276•mbastos•18h ago•225 comments

A look at IBM's short-lived "butterfly" ThinkPad 701 of 1995

https://www.fastcompany.com/91356463/ibm-thinkpad-701-butterfly-keyboard
71•vontzy•3d ago•20 comments

RisingWave: An Open‑Source Stream‑Processing and Management Platform

https://github.com/risingwavelabs/risingwave
34•Sheldon_fun•3d ago•4 comments

Fixing a Direct3D9 bug in Far Cry (2018)

https://houssemnasri.github.io/2018/07/07/farcry-d3d9-bug/
16•anotherhue•6h ago•0 comments

All AI models might be the same

https://blog.jxmo.io/p/there-is-only-one-model
197•jxmorris12•15h ago•101 comments

USB-C hubs and my slow descent into madness (2021)

https://overengineer.dev/blog/2021/04/25/usb-c-hub-madness/
142•pabs3•7h ago•98 comments

Apple Intelligence Foundation Language Models Tech Report 2025

https://machinelearning.apple.com/research/apple-foundation-models-tech-report-2025
214•2bit•15h ago•154 comments

Apple bans entire dev account, no reason given

https://twitter.com/rameerez/status/1945784476723810739
107•eecc•3h ago•62 comments

Astronomers Discover Rare Distant Object in Sync with Neptune

https://pweb.cfa.harvard.edu/news/astronomers-discover-rare-distant-object-sync-neptune
34•MaysonL•9h ago•6 comments

Anthropic tightens usage limits for Claude Code without telling users

https://techcrunch.com/2025/07/17/anthropic-tightens-usage-limits-for-claude-code-without-telling-users/
326•mfiguiere•12h ago•203 comments

Archaeologists discover tomb of first king of Caracol

https://uh.edu/news-events/stories/2025/july/07102025-caracol-chase-discovery-maya-ruler.php
146•divbzero•4d ago•35 comments

Run TypeScript code without worrying about configuration

https://tsx.is/
75•nailer•15h ago•45 comments

Modular Interpreters and Visitors in Rust with Extensible Variants and CGP

https://contextgeneric.dev/blog/extensible-datatypes-part-2/
15•PaulHoule•2d ago•0 comments
Open in hackernews

Fully homomorphic encryption and the dawn of a private internet

https://bozmen.io/fhe
185•barisozmen•5h ago

Comments

dcow•4h ago
Assuming speed gets solved as predicted, for an application like search, the provider would have to sync a new database of “vectors” to all clients every time the index updates. On top of that, these DBs are tens if not hundreds of GB huge.
blintz•4h ago
I say this as a lover of FHE and the wonderful cryptography around it:

While it’s true that FHE schemes continue to get faster, they don’t really have hope of being comparable to plaintext speeds as long as they rely on bootstrapping. For deep, fundamental reasons, bootstrapping isn’t likely to ever be less than ~1000x overhead.

When folks realized they couldn’t speed up bootstrapping much more, they started talking about hardware acceleration, but it’s a tough sell at time when every last drop of compute is going into LLMs. What $/token cost increase would folks pay for computation under FHE? Unless it’s >1000x, it’s really pretty grim.

For anything like private LLM inference, confidential computing approaches are really the only feasible option. I don’t like trusting hardware, but it’s the best we’ve got!

ipnon•4h ago
Don't you think there is a market for people who want services that have provable privacy even if it costs 1,000 times more? It's not as big a segment as Dropbox but I imagine it's there.
poly2it•4h ago
???

For the equivalent of $500 in credit you could self host the entire thing!

haiku2077•3h ago
You're not joking. If you're like most people and have only a few TiB of data in total, self hosting on a NAS or spare PC is very viable. There are even products for non-technical people to set this up (e.g. software bundled with a NAS). The main barrier is having an ISP with a sufficient level of service.
kube-system•2h ago
Sure, hardware is cheap.

However if you actually follow the 3-2-1 rule with your backups, then you need to include a piece of real estate in your calculation as well, which ain’t cheap.

bcraven•2h ago
I keep a small backup drive at my office which I bring home each month to copy my most sensitive documents and photos onto.

All my ripped media could be ripped again: I only actually have a couple of Tb of un-lose-able data.

adastra22•1h ago
FHE is so much more expensive that it would still be cheaper.
palata•43m ago
If you self-host your NAS, then your server has access to the data in clear to do fancy stuff, and you can make encrypted backups to any cloud you like, right?
drcolly•23m ago
The statements made in the linked description of this cannot be true, such as Google not being able to read what you sent them and not being able to read what they responded with.

Having privacy is a reasonable goal, but VPNs and SSL/TLS provide enough for most, and at some point your also just making yourself a target for someone with the power to undo your privacy and watch you more closely- why else would you go through the trouble unless you were to be hiding something? It’s the same story with Tor, VPN services, etc.- those can be compromised at will. Not to say you shouldn’t use them if you need to have some level of security functionally, but no one with adequate experience believes in absolute security.

mahmoudimus•4h ago
there is, it's called governments. however this technology is so slow that using it in mission critical systems (think communication / coordinates during warfare) that it is not feasible IMO.

the parent post is right, confidential compute is really what we've got.

landl0rd•3h ago
For LLM inference, the market that will pay $20,000 for what is now $20 is tiny.
oakwhiz•3h ago
For most this would mean only specially treating a subset of all the sensitive data they have.
bawolff•21m ago
If we are talking 1000x more latency, that is a pretty hard sell.

Something that normally takes 30 seconds now takes over 8 hours.

txdv•3h ago
I get that there is a big LLM hype, but is there really no other application for FHE? Like for example trading algorithms (not the high speed once) that you can host on random servers knowing your stuff will be safe or something similar?
seanhunter•2h ago
I speak as someone who used to build trading algorithms (not the high speed ones) for a living for several years, so knows that world pretty well. I highly doubt anyone who does that will host their stuff on random servers even if you had something like FHE. Why? Because it's not just the code that is confidential.

1) if you are a registered broker dealer you will just incur a massive amount of additional regulatory burden if you want to host this stuff in any sort of "random server"

2) Whoever you are, you need the pipe from your server to the exchange to be trustworthy, so no-one can MITM your connection and front-run your (client's) orders.

3) This is an industry where when people host servers in something like an exchange data center it's reasonably common to put them in a locked cage to ensure physical security. No-one is going to host on a server that could be physically compromised. Remember that big money is at stake and data center staff typically aren't well paid (compared to someone working for an IB or hedge fund), so social engineering would be very effective if someone wanted to compromise your servers.

4)Even if you are able to overcome #1 and are very confident about #2 and #3, even for slow market participants you need to have predictable latency in your execution or you will be eaten for breakfast by the fast players[1]. You won't want to be on a random server controlled by anyone else in case they suddenly do something that affects your latency.

[1] For example, we used to have quite slow execution ability compared with HFTs and people who were co-located at exchanges, so we used to introduce delays when we routed orders to multiple exchanges so the orders would arrive at their destinations at precisely the same time. Even though our execution latency was high, this meant no-one who was colocated at the exchange could see the order at one exchange and arb us at another exchange.

bruce511•4h ago
I get the "client side" of this equation; some number of users want to keep their actions/data private enough that they are willing to pay for it.

What I don't think they necessarily appreciate is how expensive that would be, and consequently how few people would sign up.

I'm not even assuming that the compute cost would be higher than currently. Let's leave aside the expected multiples in compute cost - although they won't help.

Assume, for example, a privacy-first Google replacement. What does that cost? (Google revenue is a good place to start that Calc.) Even if it was say $100 a year (hint; it's not) how many users would sign up for that? Some sure, but a long long way away from a noticeable percentage.

Once we start adding zeros to that number (to cover the additional compute cost) it gets even lower.

While imperfect, things like Tor provide most of the benefit, and cost nothing. As an alternative it's an option.

I'm not saying that HE is useless. I'm saying it'll need to be paid for, and the numbers that will pay to play will be tiny.

barisozmen•3h ago
An FHE Google today would be incredible expensive and incredibly slow. No one would pay for it.

The key question I think is how much computing speed will improve in the future. If we assume FHE will take 1000x more time, but hardware also becomes 1000x faster, then the FHE performance will be similar to today's plaintext speed.

Predicting the future is impossible, but as software improves and hardware becoming faster and cheaper every year, and as FHE provides a unique value of privacy, it's plausible that at some point it can become the default (if not 10 years, maybe in 50 years).

Today's hardware is many orders of magnitudes faster compared to 50 years ago.

There are of course other issues too. Like ciphertext size being much larger than plaintext, and requirement of encrypting whole models or indexes per client on the server side.

FHE is not practical for most things yet, but its venn diagram of feasible applications will only grow. And I believe there will be a time in the future that its venn diagram covers search engines and LLMs.

demaga•3h ago
> If we assume FHE will take 1000x more time, but hardware also becomes 1000x faster, then the FHE performance will be similar to today's plaintext speed

Yeah but this also means you can do 1000x more things on plaintext.

paulrudy•3h ago
> FHE enables computation on encrypted data

This is fascinating. Could someone ELI5 how computation can work using encrypted data?

And does "computation" apply to ordinary internet transactions like when using a REST API, for example?

pluto_modadic•3h ago
a simple example of partial homomorphic encryption (not full), would be if a system supports addition or multiplication. You know the public key, and the modulus, so you can respect the "wrap around" value, and do multiplication on an encrypted number.

other ones I imagine behave kinda like translating, stretching, or skewing a polynomial or a donut/torus, such that the point/intercepts are still solveable, still unknown to an observer, and actually represent the correct mathematical value of the operation.

just means you treat the []byte value with special rules

paulrudy•3h ago
Thank you. So based on your examples it sounds like the "computation" term is quite literal. How would this apply at larger levels of complexity like interacting anonymously with a database or something like that?
strangecasts•53m ago
There are FHE schemes which effectively allow putting together arbitrary logical circuits, so you can make larger algorithms FHE by turning them into FHE circuits -- Jeremy Kun's 2024 overview [1] has a good summary

[1] https://www.jeremykun.com/2024/05/04/fhe-overview/ - discussed previously: https://news.ycombinator.com/item?id=40262626

dachrillz•3h ago
A very basic way of how it works: encryption is basically just a function e(m, k)=c. “m” is your plaintext and “c” is the encrypted data. We call it an encryption function if the output looks random to anyone that does not have the key

If we could find some kind of function “e” that preserves the underlying structure even when the data is encrypted you have the outline of a homomorphic system. E.g. if the following happens:

e(2,k)*e(m,k) = e(2m,k)

Here we multiplied our message with 2 even in its encrypted form. The important thing is that every computation must produce something that looks random, but once decrypted it should have preserved the actual computation that happened.

It’s been a while since I did crypto, so google might be your friend here; but there are situations when e.g RSA preserves multiplication, making it partially homomorphic.

littlecranky67•2h ago
I get how that works for arithmetic operations - what about stuff like sorting, finding an element in a set etc? This would require knowledge of the cleartext data, wouldn't it?
barisozmen•2h ago
You can reduce anything happening on the computer to arithmetic operations. If you can do additions and multiplications, then it's turing complete. All others can be constructed from them.
littlecranky67•2h ago
While correct, that doesn't answer the question at all, though. If I have my address book submited into an FHE system and want to sort by name - how do you do that if the FHE system does not have access to cleartext names?
barisozmen•2h ago
You can do that by encrypting the names. You send encrypted names to the FHE-server, and then the server does necessary sorting computations on it.

The point of FHE is it can operate on gibberish-looking ciphertext, and when this ciphertext decrypted afterwards, the result is correct.

Indeed, there are those working on faster FHE sorting: https://eprint.iacr.org/2021/551.pdf

gadders•22m ago
Honestly it breaks my brain as well. I just have to take it on trust that it apparently works.
harvie•3h ago
Ok, lets stop being delusional here. I'll tell you how this will actualy work:

Imagine your device sending Google an encrypted query and getting back the exact results it wanted — without you having any way of knowing what that query was or what result they returned. The technique to do that is called Fully Homomorphic Encryption (FHE).

pluto_modadic•3h ago
queries are Oblivious Transfer - a second limited case of FHE that actually addresses the filter threat model.
teo_zero•3h ago
I think the opening example involving Google is misleading. When I hear "Google" I think "search the web".

The articles is about getting an input encrypted with key k, processing it without decrypting it, and sending back an output that is encrypted with key k, too. Now it looks to me that the whole input must be encrypted with key k. But in the search example, the inputs include a query (which could be encrypted with key k) and a multi-terabyte database of pre-digested information that's Google's whole selling point, and there's no way this database could be encrypted with key k.

In other words this technique can be used when you have the complete control of all the inputs, and are renting the compute power from a remote host.

Not saying it's not interesting, but the reference to Google can be misunderstood.

ElFitz•1h ago
> Now it looks to me that the whole input must be encrypted with key k. But in the search example, the inputs include a query […] and a multi-terabyte database […]

That’s not the understanding I got from Apple’s CallerID example[0][1]. They don’t seem to be making an encrypted copy of their entire database for each user.

[0]: https://machinelearning.apple.com/research/homomorphic-encry...

[1]: https://machinelearning.apple.com/research/wally-search

aitchnyu•3h ago
E2EE git was invented. I asked the creator if server can enforce protected branches or force pushes. He has no solution for evil clients. Maybe this could lead to E2EE Github?

https://news.ycombinator.com/item?id=44530927

athrowaway3z•2h ago
> Internet's "Spy by default" can become "Privacy by default".

I've been building and promoting digital signatures for years. Its bad for people and market-dynamics to have Hacker News or Facebook be the grand arbiter of everyone's identity in a community.

Yet here we are because its just that much simpler to build and use it this way, which gets them more users and money which snowballs until alternatives dont matter.

In the same vein, the idea that FHE is a missing piece many people want is wrong. Everything is still almost all run on trust, and that works well enough that very few use cases want the complexity cost - regardless of operation overhead - to consider FHE.

JumpCrisscross•17m ago
> that works well enough that very few use cases want the complexity cost

FHE + AI might be the killer combination, the latter sharing the complexity burden.

gblargg•2h ago
The idea that these will keep being improved on in speed reminds me of the math problem about average speed:

> An old car needs to go up and down a hill. In the first mile–the ascent–the car can only average 15 miles per hour (mph). The car then goes 1 mile down the hill. How fast must the car go down the hill in order to average 30 mph for the entire 2 mile trip?

Past improvement is no indicator of future possibility, given that each improvement was not re-application of the same solution as before. These are algorithms, not simple physical processes shrinking.

perching_aix•2h ago
41 mph, assuming the person asking the question was just really passionate about rounding numbers and/or had just the bare minimum viable measurement tooling available :)))
DeathArrow•2h ago
Most states will probably either forbid this or demand back doors.
IshKebab•1h ago
I think this should talk about the kinds of applications you can actually do with FHE because you definitely can't implement most applications (not at a realistic scale anyway).
utf_8x•1h ago
As someone who knows basically nothing about cryptography - wouldn't training an LLM to work on encrypted data also make that LLM extremely good at breaking that encryption?

I assume that doesn't happen? Can someone ELI5 please?

mynameismon•1h ago
From my understanding of cryptography, most schemes are created with the assumption that _any_ function that does not have access to the secret key will have a probabilistically small chance of decoding the correct message (O(exp(-key_length)) usually). As LLMs are also a function, it is extremely unlikely for cryptographic protocols to be broken _unless_ LLMs can allow for new types of attacks all together.
4gotunameagain•1h ago
Because math. The data that would be necessary to train an LLM to break (properly) encrypted information would be indistinguishable from random bytes.

How do you train a model when the input has no apparent correlation to the output ?

strangecasts•1h ago
Good encryption schemes are designed so that ciphertexts are effectively indistinguishable from random data -- you should not be able to see any pattern in the encrypted text without knowledge of the key and the algorithm.

If your encryption scheme satisfies this, there are no patterns for the LLM to learn: if you only know the ciphertext but not the key, every continuation of the plaintext should be equally likely, so trying to learn the encryption scheme from examples is effectively trying to predict the next lottery numbers.

This is why FHE for ML schemes [1] don't try to make ML models work directly on encrypted data, but rather try to package ML models so they can run inside an FHE context.

[1] It's not for language models, but I like Microsoft's CryptoNets - https://www.microsoft.com/en-us/research/wp-content/uploads/... - as a more straightforward example of how FHE for ML looks in practice

Jgoauh•1h ago
Homomophobic just 18 days after pride month :( damn
zkmon•1h ago
What baffles me is, how can code perform computations and comparisons on data that is still encrypted in memory.
VMG•1h ago
> 3. Data while processing is un-encrypted, as code need to 'see' the data

read the article again

baby•1h ago
code in FHE doesn't need to see the data
tsimionescu•1h ago
It's simple conceptually: you find an encryption method Enc that guarantees `Sum(Enc(x), Enc(y)) = Enc(Sum(x, y))`. That's ultimately all there is to it. Then, you give the server enc_x and enc_y, the server computes the sum, and returns to you enc_sum. You then decrypt the value you got and that's x+y.

Since lots of functions behave in this way in relation to sums and products, you "just" need to find ones that are hard to reverse so they can be used for encryption as well.

Unfortunately this turns out to not work so simply. In reality, they needed to find different functions FHESum and FHEMultiply, that are actually much harder to compute (1000x more CPU than the equivalent "plaintext" function is a low estimate of the overhead) but that guarantee the above.

orwin•1h ago
I interrupted this fascinating read to tell that "actually", quantum computers are great at multi-dimensional calculation if you find the correct algorithms. It's probably the only thing they will ever be great at. You want to show that finding the algorithm is not possible with our current knowledge.

anyway, making the computer do the calculation is one thing, getting it to spew the correct data is another.... But still, the article (which seems great at the moment) brushes it of a bit too quickly.

redleader55•1h ago
Full homomorphic encryption is not the future for private internet, confidential VMs are. CVMs are using memory encryption and separation from the host OS. ARM has TEE, AMD has SEV and Intel has been fumbling around with SGX and TDX for more than a decade.
udev4096•1h ago
https://sgx.fail