Fully homomorphic encryption and the dawn of a private internet
Performance and scalability limits
- Many commenters argue current and foreseeable FHE is orders of magnitude slower (often cited ~1000×, possibly far worse) than plaintext due to bootstrapping and huge ciphertexts.
- Even without bootstrapping, ciphertext blowup (often ~10³× larger) implies massive extra memory bandwidth and compute that hardware advances alone are unlikely to erase.
- Latency impacts are framed as unacceptable for most user-facing tasks (e.g., milliseconds → seconds/minutes; 30s → hours).
Search, databases, and index problems
- Fully private search over large indexes is highlighted as especially hard:
- Naively, encrypted-key search is O(n) instead of O(log n); recent PIR-style schemes with polylog(n) queries require extreme preprocessing and storage blowups (petabytes for modest DBs).
- For “FHE Google,” either the server must encrypt huge indexes per client or do near-linear work per query, both viewed as impractical.
- Some systems mix FHE/PIR with partial leakage (e.g., hashed prefixes, subsets, anonymous networks), trading strict privacy for performance.
Use cases and economics
- Strong consensus: generic “private internet” via FHE is not economically viable soon. A privacy‑first Google‑scale service would be vastly more expensive and far slower; few users would pay enough.
- People often prefer free, data‑harvesting services; privacy‑preserving alternatives already exist but remain niche.
- FHE is seen as promising for narrow, high‑value, low‑throughput tasks: finance, regulated data sharing, some medical or government/military computations, “data owner vs model owner” scenarios.
Alternatives to FHE
- Confidential computing (TEEs: SGX/TDX/SEV/ARM TEE) is repeatedly described as the only realistic way to do private LLM inference and many cloud workloads, despite hardware‑trust issues and past breaks.
- Specialized searchable encryption and PIR schemes can give near‑plaintext search performance for specific patterns, with FHE reserved for small filtered subsets.
- Self‑hosting and encrypted backups are presented as a simpler, cheaper privacy route for many personal data uses.
How FHE works & security nuances
- Multiple explanations outline homomorphism: operations on ciphertext correspond to operations on plaintext, enabling arbitrary circuits via additions/multiplications.
- Some struggle with the intuition that “being able to compute means weaker encryption”; others note:
- FHE is malleable (not NM‑CCA2) but can still be IND‑CPA/semantically secure.
- Computation may leak allowed structure (e.g., which operations were run) but not plaintext, and “circuit privacy” research aims to hide even that.
Privacy, incentives, and politics
- Commenters doubt big providers will voluntarily adopt FHE that blocks data harvesting without strong regulation or market pressure.
- Governments may resist or demand backdoors; export controls and surveillance incentives are seen as major non‑technical obstacles.