mstdn.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A general-purpose Mastodon server with a 500 character limit. All languages are welcome.

Administered by:

Server stats:

15K
active users

#ttp

1 post1 participant0 posts today

I very often agree with Bruce Schneier. But not today.

If I wanted to make a private agreement through a digital trusted third party, why would I need an LLM?

The examples include comparing salaries. Instead of setting up (and later securely deleting) an LLM, we could just as easily run a function boiling down to
`return a > b;`

No need to involve LLMs with their uncertainty or possibility to do prompt injection.
#BruceSchneier #LLM #TTP
schneier.com/blog/archives/202

Schneier on Security · AIs as Trusted Third Parties - Schneier on SecurityThis is a truly fascinating paper: “Trusted Machine Learning Models Unlock Private Inference for Problems Currently Infeasible with Cryptography.” The basic idea is that AIs can act as trusted third parties: Abstract: We often interact with untrusted parties. Prioritization of privacy can limit the effectiveness of these interactions, as achieving certain goals necessitates sharing private data. Traditionally, addressing this challenge has involved either seeking trusted intermediaries or constructing cryptographic protocols that restrict how much data is revealed, such as multi-party computations or zero-knowledge proofs. While significant advances have been made in scaling cryptographic approaches, they remain limited in terms of the size and complexity of applications they can be used for. In this paper, we argue that capable machine learning models can fulfill the role of a trusted third party, thus enabling secure computations for applications that were previously infeasible. In particular, we describe Trusted Capable Model Environments (TCMEs) as an alternative approach for scaling secure computation, where capable machine learning model(s) interact under input/output constraints, with explicit information flow control and explicit statelessness. This approach aims to achieve a balance between privacy and computational efficiency, enabling private inference where classical cryptographic solutions are currently infeasible. We describe a number of use cases that are enabled by TCME, and show that even some simple classic cryptographic problems can already be solved with TCME. Finally, we outline current limitations and discuss the path forward in implementing them...
Schneier on Security · AIs as Trusted Third Parties - Schneier on SecurityThis is a truly fascinating paper: “Trusted Machine Learning Models Unlock Private Inference for Problems Currently Infeasible with Cryptography.” The basic idea is that AIs can act as trusted third parties: Abstract: We often interact with untrusted parties. Prioritization of privacy can limit the effectiveness of these interactions, as achieving certain goals necessitates sharing private data. Traditionally, addressing this challenge has involved either seeking trusted intermediaries or constructing cryptographic protocols that restrict how much data is revealed, such as multi-party computations or zero-knowledge proofs. While significant advances have been made in scaling cryptographic approaches, they remain limited in terms of the size and complexity of applications they can be used for. In this paper, we argue that capable machine learning models can fulfill the role of a trusted third party, thus enabling secure computations for applications that were previously infeasible. In particular, we describe Trusted Capable Model Environments (TCMEs) as an alternative approach for scaling secure computation, where capable machine learning model(s) interact under input/output constraints, with explicit information flow control and explicit statelessness. This approach aims to achieve a balance between privacy and computational efficiency, enabling private inference where classical cryptographic solutions are currently infeasible. We describe a number of use cases that are enabled by TCME, and show that even some simple classic cryptographic problems can already be solved with TCME. Finally, we outline current limitations and discuss the path forward in implementing them...

A new #flashpoint is developing between #Pakistan and #Afghanistan as the former launched #extraterritorial strikes in #Paktika over claims that #PakistaniTaliban #TTP (ally of #AfghaniTaliban) use Afghan soil to launch attacks in Pakistan.

Earlier, TTP attacked a Pakistani checkpoint and killed at least 16 Pakistani soldiers.

Afghanistan’s Defense Ministry said Saturday that its forces hit several points inside Pakistan in retaliation for deadly airstrikes last week.

apnews.com/article/afghanistan

AP News · Afghan forces target Pakistan in retaliation for deadly airstrikesBy THE ASSOCIATED PRESS

Tensione alla frontiera

Le forze dei #Talebani si schierano al confine con il #Pakistan.

Il 24 dicembre, jet militari pakistani hanno condotto attacchi aerei all'interno dell'#Afghanistan, prendendo di mira presunti nascondigli del gruppo militante islamista Tehrik-e Taliban Pakistan (#TTP).

Gli attacchi aerei del 24 dicembre sono avvenuti solo pochi giorni dopo che i militanti del TTP avevano effettuato un raid ....

Ulteriori approfondimenti 👇

dilettafileninews.com/

News - Diletta FileniNews - Diletta Fileni - Sperimenta un servizio personalizzato con contenuti esclusiviNews - Diletta Fileni - Sperimenta un servizio personalizzato con contenuti esclusivi