I'm pretty sure all the cloud vulnerabilities and exploits you describe is not applicable to the larger cloud providers. Some use their own custom built hypervisors to address these same issues.
You'd be surprised. The hello from the other side attack that I mentioned was performed on AWS. Most attacks do target the big providers, because that's the only market that matters. I was reading about the AWS hypervisor a bit for this video, it's mostly for management of VMs, and while they do have some security features, things like memory encryption have to be supported by the CPU. You can't retrofit that from software without paying a huge performance cost.
@@DrWaku I agree, this style of subtitle animation is better for when you need to maintain a short attention span in tiktoks/shorts/etc. Captions are fine, but a more static transition would fit the video style better
Any point in the hardware where the data is present at it's decrypted state, or where the decryption key itself is present, is a weak spot. The only way it can really be 100% (rounding up, of course) secure is if someone figures out a way to perform the required computation directly with the encrypted data, without having the decryption key.
There are actually schemes to do this, it's called homomorphic encryption. But usually they struggle with things like addition and subtraction, can't do anything too complicated. And any query has to be run over the entire encrypted database if you're trying to search for something. So it's feasible at small scale at least.
wheres the conversation about all servers are run on the electrical grid..shut grid, nothing remains..i make it sound simple, but substrate is fragile.
Without watching the video, I'm going to say it's because data centers are expensive and you control CapEX by leasing scalable computing resources instead of spending $500,000,000 dollars on servers and air conditioners.
Encryption requires keys which also needs to be encrypted by a different systems which manages by a different rotating Admins. But here is the weak point, "the admin". But I am not sure we should allow AI agents to replace admins. My 2 cents worth.
Most of these hardware-based encryption schemes have a key which is baked into the hardware and cannot be changed. And in theory cannot be read from the hardware without destroying the hardware.
I'm genuinely curious if you really understand what he is talking about. If you do, please suggest how to improve attestation UX without compromising security. Based on the comments, most people here are clueless about confidential computing.
hey just wanted to say that I think your cool and I like your videos. I feel like you give quick but generally easy to understand breakdowns of different aspects of computer science and current AI information. Appreciate ya!
I want to correct you and say that Nvidia is still charging gamers a lot for the GPUs. The cheapest Nvidia you can buy today is roughly the same price as a top-of-the-line Nvidia from 10 years ago.
Reality is that you have to use them big clouds players. If I start an ai company, I need GPU to train the model. Where do I buy it? GPU is out of stock because the big cloud players brought all of it. Even if I get it, I need cooling system, and other equipment that really adds up. So I go back to the cloud. And if I deploy it as a service/ product, I need to scale it and a platform, which again the cloud…right?
Who here has built their own machine learning computer/cluster? :)
Discord: discord.gg/AgafFBQdsc
Patreon: www.patreon.com/DrWaku
Always a good day when your video drops.
Thanks ;)
I'm pretty sure all the cloud vulnerabilities and exploits you describe is not applicable to the larger cloud providers. Some use their own custom built hypervisors to address these same issues.
You'd be surprised. The hello from the other side attack that I mentioned was performed on AWS. Most attacks do target the big providers, because that's the only market that matters. I was reading about the AWS hypervisor a bit for this video, it's mostly for management of VMs, and while they do have some security features, things like memory encryption have to be supported by the CPU. You can't retrofit that from software without paying a huge performance cost.
Another well-researched and written video. I learned a lot. Thanks Dr. Waku!
Thank you for your kind comment!
A minor complaint - The white text with red background that shows up from time to time is really distracting.
The subtitles you mean? Okay. Thanks for the feedback.
@@DrWaku I agree, this style of subtitle animation is better for when you need to maintain a short attention span in tiktoks/shorts/etc. Captions are fine, but a more static transition would fit the video style better
Anecdotal, but I like the subtitles cause I have ADD and it helps me maintain focus on the content while giving my brain something to do haha
Any point in the hardware where the data is present at it's decrypted state, or where the decryption key itself is present, is a weak spot. The only way it can really be 100% (rounding up, of course) secure is if someone figures out a way to perform the required computation directly with the encrypted data, without having the decryption key.
There are actually schemes to do this, it's called homomorphic encryption. But usually they struggle with things like addition and subtraction, can't do anything too complicated. And any query has to be run over the entire encrypted database if you're trying to search for something. So it's feasible at small scale at least.
"if someone figures out a way to perform the required computation"...no. Not someone but next gen AI can figure it out......
There's some new tech called Internet Computer Protocol that is based on a decentralised world computer (ICP)
wheres the conversation about all servers are run on the electrical grid..shut grid, nothing remains..i make it sound simple, but substrate is fragile.
I cannot hear the word „safe“ anymore in context of AI 🤦🏻♂️
Dammn nice video again! Next-gen teacher be like:
Please explain cryptocurrency and whether it has a future.
Excellent and concise overview!
Without watching the video, I'm going to say it's because data centers are expensive and you control CapEX by leasing scalable computing resources instead of spending $500,000,000 dollars on servers and air conditioners.
Thanks, I changed the title....
Encryption requires keys which also needs to be encrypted by a different systems which manages by a different rotating Admins. But here is the weak point, "the admin". But I am not sure we should allow AI agents to replace admins. My 2 cents worth.
Most of these hardware-based encryption schemes have a key which is baked into the hardware and cannot be changed. And in theory cannot be read from the hardware without destroying the hardware.
Love your videos!
I am impressed how you spoke 17 min of something so obvious hahaha
Well I talk about a lot of things, the title was supposed to be intriguing, but wasn't... I tried changing it
I'm genuinely curious if you really understand what he is talking about. If you do, please suggest how to improve attestation UX without compromising security. Based on the comments, most people here are clueless about confidential computing.
hey just wanted to say that I think your cool and I like your videos. I feel like you give quick but generally easy to understand breakdowns of different aspects of computer science and current AI information. Appreciate ya!
Cheap cheap.
I want to correct you and say that Nvidia is still charging gamers a lot for the GPUs. The cheapest Nvidia you can buy today is roughly the same price as a top-of-the-line Nvidia from 10 years ago.
Reality is that you have to use them big clouds players. If I start an ai company, I need GPU to train the model. Where do I buy it? GPU is out of stock because the big cloud players brought all of it. Even if I get it, I need cooling system, and other equipment that really adds up. So I go back to the cloud. And if I deploy it as a service/ product, I need to scale it and a platform, which again the cloud…right?