<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: julesdrean</title><link>https://news.ycombinator.com/user?id=julesdrean</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Thu, 23 Apr 2026 13:56:58 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=julesdrean" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by julesdrean in "How an inference provider can prove they're not serving a quantized model"]]></title><description><![CDATA[
<p>Apple does something very similar with Apple Private Cloud Compute. It's interesting cause their isolation argument is different. For instance, memory is not encrypted (so weaker protection against physical attacks), but they measure and guarantee integrity (and need to trust) all code running on the machine, not just inside the secure enclave.<p>Good question is how many lines of code do you need to trust at the end of the day between these different designs.</p>
]]></description><pubDate>Sat, 21 Feb 2026 21:48:25 +0000</pubDate><link>https://news.ycombinator.com/item?id=47105168</link><dc:creator>julesdrean</dc:creator><comments>https://news.ycombinator.com/item?id=47105168</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47105168</guid></item><item><title><![CDATA[New comment by julesdrean in "How an inference provider can prove they're not serving a quantized model"]]></title><description><![CDATA[
<p>The provider cannot chose the attestation that is sent, the hardware assembles the attestation through mechanisms that it cannot control. That why it's called "trusted hardware" technology, you only need to trust the hardware (how it was implemented), and you don't need to trust the provider operating it.</p>
]]></description><pubDate>Sat, 21 Feb 2026 21:41:24 +0000</pubDate><link>https://news.ycombinator.com/item?id=47105099</link><dc:creator>julesdrean</dc:creator><comments>https://news.ycombinator.com/item?id=47105099</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47105099</guid></item><item><title><![CDATA[Masquerade MCP: Redact. Replace. Retain Control]]></title><description><![CDATA[
<p>Article URL: <a href="https://github.com/postralai/masquerade">https://github.com/postralai/masquerade</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=44369402">https://news.ycombinator.com/item?id=44369402</a></p>
<p>Points: 1</p>
<p># Comments: 0</p>
]]></description><pubDate>Tue, 24 Jun 2025 18:42:37 +0000</pubDate><link>https://github.com/postralai/masquerade</link><dc:creator>julesdrean</dc:creator><comments>https://news.ycombinator.com/item?id=44369402</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44369402</guid></item><item><title><![CDATA[New comment by julesdrean in "Launch HN: Tinfoil (YC X25): Verifiable Privacy for Cloud AI"]]></title><description><![CDATA[
<p>Love Open Titan! RISC-V all the way babe!
The team is bunker: several of my labmates now work there</p>
]]></description><pubDate>Thu, 15 May 2025 21:00:36 +0000</pubDate><link>https://news.ycombinator.com/item?id=43999290</link><dc:creator>julesdrean</dc:creator><comments>https://news.ycombinator.com/item?id=43999290</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43999290</guid></item><item><title><![CDATA[New comment by julesdrean in "Launch HN: Tinfoil (YC X25): Verifiable Privacy for Cloud AI"]]></title><description><![CDATA[
<p>Azure and GCP offer Confidential VMs which removes trust from the cloud providers. We’re trying to also remove trust in the service provider (aka ourselves). One example is that when you use Azure or GCP, by default, the service operator can SSH into the VM. We cannot SSH into our inference server and you can check that’s true.</p>
]]></description><pubDate>Thu, 15 May 2025 19:37:49 +0000</pubDate><link>https://news.ycombinator.com/item?id=43998503</link><dc:creator>julesdrean</dc:creator><comments>https://news.ycombinator.com/item?id=43998503</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43998503</guid></item><item><title><![CDATA[New comment by julesdrean in "Launch HN: Tinfoil (YC X25): Verifiable Privacy for Cloud AI"]]></title><description><![CDATA[
<p>Check out incredible work by Bunnie to make this possible at home <a href="https://www.bunniestudios.com/blog/2024/iris-infra-red-in-situ-project-updates/" rel="nofollow">https://www.bunniestudios.com/blog/2024/iris-infra-red-in-si...</a></p>
]]></description><pubDate>Thu, 15 May 2025 18:49:47 +0000</pubDate><link>https://news.ycombinator.com/item?id=43998072</link><dc:creator>julesdrean</dc:creator><comments>https://news.ycombinator.com/item?id=43998072</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43998072</guid></item><item><title><![CDATA[New comment by julesdrean in "Launch HN: Tinfoil (YC X25): Verifiable Privacy for Cloud AI"]]></title><description><![CDATA[
<p>Yes Azure has! They have very different trust assumptions though. We wrote about this here <a href="https://tinfoil.sh/blog/2025-01-30-how-do-we-compare">https://tinfoil.sh/blog/2025-01-30-how-do-we-compare</a></p>
]]></description><pubDate>Thu, 15 May 2025 18:44:25 +0000</pubDate><link>https://news.ycombinator.com/item?id=43998018</link><dc:creator>julesdrean</dc:creator><comments>https://news.ycombinator.com/item?id=43998018</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43998018</guid></item></channel></rss>