Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

How is this not vulnerable to side-channel attacks like disk-access patterns?

Could I, as a malicious server, request myself a target article and correlate that with legitimate user requests?



> With a proper implementation of PIR, the server still needs to scan through the entire encrypted dataset (this is unavoidable, otherwise its I/O patterns would leak information)

https://news.ycombinator.com/item?id=31669370 (not original poster)




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: