I think we need to distinguish between the energy requirements that you said, as well as the privacy requirements. These two are not always aligned. There’s always a way, like with homomorphic encryption and all sort of computational encrypted data, secure multi party computation, and so on, to trade privacy.

Keyboard shortcuts

j previous speech k next speech