4 Prevalent Themes in the Hacker News Discussion
1. Disagreement Over the Definition and Validity of "End-to-End Encryption"
A central point of contention is whether Confer's use of a Trusted Execution Environment (TEE) constitutes true end-to-end encryption (E2EE), with many arguing it's a misnomer or "weasely language."
- paxys: "
trusted execution environment!= end-to-end encryption. The entire point of E2EE is that both 'ends' need to be fully under your control." - Stefan-H: "The point of E2EE is that only the people/systems that need access to the data are able to do so. If the message is encrypted on the user's device and then is only decrypted in the TEE where the data is needed... then in what way is it not end-to-end encrypted?"
- shawnz: "This interpretation basically waters down the meaning of end-to-end encryption to the point of uselessness. You may as well just say 'encryption'."
2. Skepticism of Hardware Security and Trusted Execution Environments
Users expressed significant doubt about the security guarantees offered by TEEs and Intel SGX, citing past vulnerabilities and fundamental trust issues with hardware vendors.
- jeroadhd: "Again with the confidential VM and remote attestation crypto theater? Moxie has a good track record... yet he seems to have a huge blindspot in trusting Intel broken 'trusted VM' computing for some inexplicable reason."
- saurik: "I am shocked at how quickly everyone is trying to forget that TEE.fail happened, and so now this technology doesn't prove anything."
- binary132: "I donβt believe for a minute that it canβt be done even with physical access. Perhaps itβs more difficult."
3. The Challenge of Trusting the Service Despite Technical Guarantees
Many commenters argued that even with remote attestation, the practical burden of verification is too high, meaning users must ultimately trust the service provider and its team.
- JohnFen: "Even so, you're still exposing your data to Confer, and so you have to trust them that they'll behave as you want. That's a security problem that Confer doesn't help with."
- JohnFen: "All of that stuff is well and good, but it seems like I have to have a fair degree of knowledge and technical skill, not to mention time and effort, to confirm that everything is as they're representing... in practice, I still have to just trust them."
- azmenak: "The net result is a need to trust Confer's identity and published releases, at least in the short term... the game theory would suggest Confer remains honest, Moxie's reputation plays are fairly large role in this."
4. Preference for Local-Only Inference as the True Privacy Gold Standard
A recurring theme was that the only way to guarantee privacy is to run models locally, even if it means sacrificing performance or capability, with TEE-based solutions seen as a compromise.
- jdthedisciple: "The best private LLM is the one you host yourself."
- jrm4: "Aha. This, ideally, is a job for local only. Ollama et al."
- orbital-decay: "At least Cocoon and similar services relying on TEE don't call this end-to-end encryption. Hardware DRM is not E2EE, it's security by obscurity."