> You can run hw attested end to end encrypted inference in ...

npub1gm7tuvr9atc6u7q3gevjfeyfyvmrlul4y67k7u7hcxztz67ceexs078rf6
hex
44de7d18790af97bed686299a9f53cff871cbdbb2c8188b67b863012ca1d94c3nevent
nevent1qqsyfhnarpus47tma45x9xdf7570lpcuhkajeqvgkeacvvqjegwefscprpmhxue69uhhyetvv9ujuem4d36kwatvw5hx6mm9qgsydl97xpj74udw0qg5vkfyujyjxd3l706jd0t0w0turp93d0vvungg6dj28Kind-1 (TextNote)
↳ Reply to Juraj (npub1m2mvvpjugwdehtaskrcl7ksvdqnnhnjur9v6g9v266nss504q7mqvlr8p9)
All frontier models are great. It's not that you depend on it, it's about being able to switch. That's why I prefer opencode to Claude Code/ codex. 6...
You can run hw attested end to end encrypted inference in cloud.
That's ... not really an option for sensitive data. It's very naive to trust the promise of those providers. Yeah, you can maybe get a secure channel to their TEE but TEEs in some far away data center can be compromised without you having any chance to ever learn about. TEE providers are notoriously secretive about their vulnerabilities and rely a lot on security by obscurity. And reading out that RAM was done before.
Raw JSON
{
"kind": 1,
"id": "44de7d18790af97bed686299a9f53cff871cbdbb2c8188b67b863012ca1d94c3",
"pubkey": "46fcbe3065eaf1ae7811465924e48923363ff3f526bd6f73d7c184b16bd8ce4d",
"created_at": 1774453837,
"tags": [
[
"e",
"7e75f25eece265238b5ea6020c85b730c84a5ebc670ce8a4b99634f928e2be19",
"wss://nos.lol/",
"root",
"dab6c6065c439b9bafb0b0f1ff5a0c68273bce5c1959a4158ad6a70851f507b6"
],
[
"e",
"5d0f38b32148bfc17beb5aff9f11d333870951df075430a70e97b8ae16a374c0",
"wss://relay.primal.net/",
"reply",
"dab6c6065c439b9bafb0b0f1ff5a0c68273bce5c1959a4158ad6a70851f507b6"
],
[
"p",
"dab6c6065c439b9bafb0b0f1ff5a0c68273bce5c1959a4158ad6a70851f507b6"
],
[
"client",
"jumble"
]
],
"content": "\u003e You can run hw attested end to end encrypted inference in cloud.\n\nThat's ... not really an option for sensitive data. It's very naive to trust the promise of those providers. Yeah, you can maybe get a secure channel to their TEE but TEEs in some far away data center can be compromised without you having any chance to ever learn about. TEE providers are notoriously secretive about their vulnerabilities and rely a lot on security by obscurity. And reading out that RAM was done before.",
"sig": "8ab48890036f7c91d12ae7a18d11f1e1c1201e9aacfd137054c5825e194b639451c329c78b88b4e10ef526af1fb74f75014313d1e5f926f9f7cd0cf37afd6d34"
}