I'm insanely bullish on confidential compute and nostr:npub10hpcheepez0fl5uz6yj4taz659l0ag7gn6gnpjquxg84kn6yqeksxkdxkr / nostr:npub1mutnyacc9uc4t5mmxvpprwsauj5p2qxq95v4a9j0jxl8wnkfvuyque23vg

AI will provide a tremendous amount of value for the world. But it will also allow for mind manipulation on steroids that makes what happened with web 2.0 cos like Facebook look tame. But there's now an alternative to the closed source mega models and hosting - OpenSecret / MapleAI effectively offer developers a publicly accessible (and open source) version of Apple's encrypted inference cloud: https://security.apple.com/blog/private-cloud-compute/

Thank god for cryptography, the work of people like Anthony / nostr:npub136jg2fnty2z5vwcnh7p4jpckrs3tk0dpueftgs7mznuuaenjpfps6tjnxf, and organizations like Apple

nostr:nevent1qvzqqqqqqypzqlwr30njrjy7nlfc95f92h694gt7l63u3853xrypcvs0td85gpndqyjhwumn8ghj7en9v4j8xtnwdaehgu3wvfskuep0dakku62ltamx2mn5w4ex2ucpr4mhxue69uhkummnw3ez6vp39eukz6mfdphkumn99e3k7mf0qywhwumn8ghj7mn0wd68ytfsxgh8jcttd95x7mnwv5hxxmmd9uqzpa66aq8lxvgg0julz3deja0gxdq0j0l4z8yzu9t0ldlz90dtjlxpk9kxgm

Reply to this note

Please Login to reply.

Discussion

I am sceptical, my bullshit detector beeps.

Secure enclaves are useful in local devices what anyone can audit. Even proprietary iPhones are audited by the great independent hackers what love to get a proof Apple lied.

But how you can be sure that AWS instance actually run some hardware what can guarantee something? How you know you are not talking with emulation of that crypto element? How independent hacker can do his research without operator knowing?