g_arakelov Profile Banner
Gurgen Arakelov Profile
Gurgen Arakelov

@g_arakelov

Followers
175
Following
103
Media
9
Statuses
149

https://t.co/10zINxs9Vl

Joined September 2022
Don't wanna be here? Send us removal request.
@g_arakelov
Gurgen Arakelov
3 days
7/ Thus, using FHE with a global key and threshold network does not provide quantum security guarantees. The real protection level is far lower than it appears. I explained the problems with this architecture in more detail here: šŸ”— https://t.co/UyZwFFlXK6
0
0
1
@g_arakelov
Gurgen Arakelov
3 days
6/ So, the effective security of these protocols is not reducible to FHE alone. It is determined by the underlying MPC layer, which typically relies on weaker assumptions, semi-trusted setups, and lacks the formal composability guarantees provided by contemporary FHE frameworks.
1
0
2
@g_arakelov
Gurgen Arakelov
3 days
5/ The weakest component in these constructions is the MPC/threshold layer. In practice, access to ~30% of key shares can be enough to reconstruct the full secret key, which then gives an attacker complete access to everything.
1
0
0
@g_arakelov
Gurgen Arakelov
3 days
4/ Many protocols built on FHE rely on threshold decryption and a single global key, shared across a small MPC network. Each participant holds only a fragment of the key, insufficient to recover the secret alone.
1
0
0
@g_arakelov
Gurgen Arakelov
3 days
3/ The security of any system or protocol is defined by the strength of its weakest component.
1
0
0
@g_arakelov
Gurgen Arakelov
3 days
2/ Most widely used FHE schemes are indeed considered secure against quantum attacks. However, that doesn’t mean every system/protocol using FHE is secure (just as not every TEE-based system is necessarily insecure)
1
0
0
@g_arakelov
Gurgen Arakelov
3 days
1/ Recently, we were once again saw that the use of TEEs in untrusted environments comes with fundamental security limitations. At the same time, interest in FHE is growing, often seen as a possible foundation for quantum-resistant computation. It's true in general but there are
1
2
21
@g_arakelov
Gurgen Arakelov
8 days
Given that @solana already has a native extension for confidential tokens, is there any reason beyond simply ā€œbumping the meme-coinā€ for launching a separate confidential token project on Solana?
1
0
3
@g_arakelov
Gurgen Arakelov
11 days
...and much more privacy
@sama
Sam Altman
11 days
Excited to partner with AMD to use their chips to serve our users! This is all incremental to our work with NVIDIA (and we plan to increase our NVIDIA purchasing over time). The world needs much more compute...
0
0
2
@FairMath
Fair Math
11 days
We are launching a major new competition on FHERMA focused on privacy-preserving AI for research groups and individual researchers. If you are interested in exploringĀ FHE for AI applicationsĀ and would like to participate, pleaseĀ complete the form ( https://t.co/PX0e0fvEt6) Ā by
2
4
3
@g_arakelov
Gurgen Arakelov
11 days
It’s not entirely honest to call TEEs secure just because no one can access the key remotely. The demonstrated attack assumes the adversary has physical access to the hardware. If remote access is impossible, that doesn’t prove the TEE is secure — it just means the threat model
@markowifk
Marko Stokić
12 days
Challenge to all the TEE haters that came out of the woods this week: If TEEs are broken, please take the private key that holds 1 $BTC https://t.co/QlWpAhfnwP contract with key protected by TEE: https://t.co/DOFrdQk61K
0
0
0
@g_arakelov
Gurgen Arakelov
14 days
Attacks on TEEs are not new; they occur periodically. What’s most interesting about this attack (beyond the attack itself) is Intel’s response: they said their security model does not assume an attacker would have hardware-level access. That seems to severely limit the scope
0
0
2
@g_arakelov
Gurgen Arakelov
16 days
Imagine if the entire history of people’s Google searches and AI chats leaked and went public. That’s not some crazy impossible idea, it could really happen, and the chance is definitely more than zero. (And whoever makes the first easy-to-use tool to explore that data would
1
1
4
@VitalikButerin
vitalik.eth
21 days
Fight Chat Control. You cannot make society secure by making people insecure. We all deserve privacy and security, without inevitably hackable backdoors, for our private communications. The fact that the government officials want to exempt themselves from their own law is
@levelsio
@levelsio
22 days
šŸ‡ŖšŸ‡ŗ My fellow Europeans You have to fight ChatControl šŸ’Ŗ Don't let @vonderleyen read your chats! https://t.co/y5Plrj1p27
827
1K
6K
@FairMath
Fair Math
23 days
Some updates regarding our https://t.co/Wh3IvxLozI experiment on how AI can keep secrets: A @MistralAI-based agent struggled to follow system instructions — users extracted the secret 50+ times last week. A comparable @OpenAI-based agent proved far more resilient. @grok-based
3
2
7
@g_arakelov
Gurgen Arakelov
28 days
Join early Birds program and be rewarded for helping AI to keep secrets.
@FairMath
Fair Math
28 days
1/8 šŸš€ Today we are launching theĀ Early Birds ProgramĀ on https://t.co/ULSUr2ulsr. Users can now earn rewards for: 1ļøāƒ£ Getting secret from red-mode agents after the cooling period. 2ļøāƒ£ Proposing guards that become Master Guards and pass the cooling period. 🧵Program details:
1
1
3
@polymorphiccap
Polymorphic Capital
1 month
Everyone talks about how powerful AI will be. Far fewer talk about how dangerous it could be if it can’t be trusted with sensitive data. That’s why we believe Palitra’s approach is interesting: training AI agents to keep secrets through a transparent, adversarial ā€œstress testā€
@FairMath
Fair Math
1 month
1/ So, here’s what we see after the first week since launching https://t.co/Wh3IvxLWpg:
0
2
7
@g_arakelov
Gurgen Arakelov
1 month
I think - and a lot of researchers in AI I’ve spoken with agrees - that training a model itself to keep secrets is near impossible. The question is whether, with additional protective layers (in Palitra’s case: an input filter, an output filter, and a defender model), we can
@FairMath
Fair Math
1 month
1/ So, here’s what we see after the first week since launching https://t.co/Wh3IvxLWpg:
0
0
4
@markowifk
Marko Stokić
1 month
Hope to see many familiar faces in Munich tomorrow at TUM Blockchain Conference https://t.co/m0p5ep2QTr Excited to share our progress with trustless agents!
1
10
69
@g_arakelov
Gurgen Arakelov
1 month
Third flight with @lufthansa this year and for the third time I am in a waiting list with 12+ people. Did I miss the news that @Ryanair secretly acquired Lufthansa?
2
0
11