Intel Demos Chip to Compute with Encrypted Data

What FHE Hardware Actually Does

  • Many comments clarify that this is fully homomorphic encryption (FHE), not SGX-style “trusted execution.”
  • Data is encrypted client-side; the accelerator performs math on ciphertext without ever seeing keys or plaintext.
  • Example given: encrypted phonebook search where the server processes the whole database and only the matching rows decrypt correctly client-side.
  • Emphasis that the hardware never needs decryption keys; at worst it can return incorrect results.

Trust, Backdoors, and Intel

  • Some remain deeply suspicious of Intel due to past features like ME and worry about hardware backdoors, especially for “very sensitive” workloads (health data, crypto, smart contracts).
  • Others argue FHE explicitly minimizes trust in hardware: since keys stay with the user, backdooring the accelerator is much harder than backdooring conventional at-rest encryption.

Performance and Practicality

  • Current software FHE is cited as ~10,000–100,000× slower than plaintext.
  • Intel’s reported ~5,000× speedup is seen as a big step, but there’s disagreement whether that still leaves 2–10× or 20–100× overhead vs. normal compute.
  • Consensus: still unsuitable for latency-sensitive tasks, but potentially viable for batch jobs (aggregations, simple ML inference on private data).
  • Some say FHE remains “impractical” or niche; others see this as the first time it’s realistically usable at all.

Applications Discussed

  • Cloud compute on sensitive data (medical, PII, regulated datasets).
  • “Confidential smart contracts” and securing crypto L1/L2.
  • E-government and voting, where volume is moderate but privacy expectations are high.
  • Possible reduction or replacement of TEEs/confidential-compute stacks if performance ever approaches normal chips.

DRM, Attestation, and Abuse Concerns

  • Several fear this could power more invasive DRM or hardware attestation in a broader “war on general-purpose computing.”
  • Counterargument: DRM still needs plaintext at the user’s eyes/ears; FHE doesn’t inherently help more than generic crypto accelerators.
  • Some note any secure construct can serve both user-protecting and user-hostile purposes; the root problem is political, not mathematical.

AI and Private Inference

  • Some predict encrypted-weight models and “private AI” as a major FHE use case; others say current compute limits make this speculative.
  • Alternative approach highlighted: running models in GPU-based secure enclaves, where data is decrypted only inside an attested, hardware-protected environment.

Other Notes

  • Concerns that governments might restrict or backdoor strong FHE; others think it’s mainly a cloud/datacenter tool, not consumer-facing.
  • Interest in open hardware and RISC-V arises as a response to growing distrust of large chip vendors.
  • Intel’s open-source encrypted-computing SDK is mentioned positively.