1 00:00:01,040 --> 00:00:08,460 ‫Meet Hommel Merfolk encryption, it will eventually allow us to do all of that stuff. 2 00:00:08,780 --> 00:00:10,960 ‫What is Homo morphic encryption? 3 00:00:11,180 --> 00:00:18,210 ‫It's the ability to perform arithmetic and normal operations on encrypted data without decrypting it. 4 00:00:18,440 --> 00:00:20,200 ‫I don't need to decrypt the data. 5 00:00:20,570 --> 00:00:20,960 ‫Right. 6 00:00:21,020 --> 00:00:27,890 ‫And I I'm going to show you the example of IBM actually querying an encrypted database and finding the 7 00:00:27,890 --> 00:00:28,420 ‫results. 8 00:00:28,700 --> 00:00:30,860 ‫Yeah, it is slow. 9 00:00:30,860 --> 00:00:33,050 ‫It is so -- slow. 10 00:00:33,410 --> 00:00:36,170 ‫But we're going to get there. 11 00:00:36,440 --> 00:00:37,010 ‫We're going to get there. 12 00:00:37,020 --> 00:00:39,980 ‫This is a great proof of concept is just the beginning. 13 00:00:39,990 --> 00:00:42,460 ‫We just unlocked this thing, man. 14 00:00:42,710 --> 00:00:43,730 ‫This is so cool. 15 00:00:44,000 --> 00:00:48,000 ‫So, yeah, we still can perform operation and think about the guys. 16 00:00:48,080 --> 00:00:50,440 ‫The thing is encrypted, right. 17 00:00:50,480 --> 00:00:54,290 ‫It is encrypted yet I am performing operations on it. 18 00:00:54,430 --> 00:01:00,620 ‫Example, let's say you have encrypted the number seven and I want to add three to this number. 19 00:01:00,620 --> 00:01:05,420 ‫Right, without looking at it right to today, without human trafficking, corruption. 20 00:01:05,510 --> 00:01:12,560 ‫You have to decrypt that number, get the seven, add three encrypted again and stored encrypted. 21 00:01:12,560 --> 00:01:12,740 ‫Right. 22 00:01:12,740 --> 00:01:15,310 ‫So that's ten right over. 23 00:01:15,410 --> 00:01:23,210 ‫Corruption allows you to the client who consumes this data that is encrypted to add to perform the plus 24 00:01:23,210 --> 00:01:27,500 ‫three, add the content, add the data and store it. 25 00:01:28,870 --> 00:01:37,600 ‫Encrypted without actually decrypting it, so the result will end up the same 10 encrypted and the client 26 00:01:37,600 --> 00:01:44,090 ‫application that does this operation, that does this query, that does this Layer seven routing. 27 00:01:44,410 --> 00:01:47,200 ‫Well, not look at the data. 28 00:01:47,410 --> 00:01:52,300 ‫And that is absolutely crucial and very, very powerful. 29 00:01:52,330 --> 00:01:56,140 ‫Now, you might you might say and how can I ensure integrity of the day? 30 00:01:56,140 --> 00:02:01,900 ‫But we'll just add a macro signature to the to the message to ensure that this is this message supposed 31 00:02:01,900 --> 00:02:02,760 ‫to look like this, right? 32 00:02:03,340 --> 00:02:03,820 ‫Yeah. 33 00:02:04,660 --> 00:02:07,180 ‫You can now query her database that is encrypted. 34 00:02:07,210 --> 00:02:08,700 ‫We're going to show that in an example. 35 00:02:08,710 --> 00:02:15,700 ‫Right, because the database is the client in this case and the data is just the the the thing that 36 00:02:15,700 --> 00:02:20,290 ‫you consume that you can stored encrypted and then you can perform the query operation. 37 00:02:20,290 --> 00:02:21,460 ‫What is a query? 38 00:02:21,490 --> 00:02:23,800 ‫Query is just a binary search tree. 39 00:02:24,280 --> 00:02:29,650 ‫I mean, you can use a LSM, but same concept, but it's just looping through things and comparing if 40 00:02:29,650 --> 00:02:31,170 ‫this greater than this is. 41 00:02:31,180 --> 00:02:33,050 ‫The left side is greater than the right side. 42 00:02:33,070 --> 00:02:34,010 ‫Go, go search. 43 00:02:34,030 --> 00:02:34,770 ‫This left three. 44 00:02:35,020 --> 00:02:36,220 ‫It's just searching. 45 00:02:36,220 --> 00:02:41,500 ‫It's just everything boils down to greater than less than plus minus shift. 46 00:02:41,500 --> 00:02:42,540 ‫Bit shift which. 47 00:02:42,550 --> 00:02:42,880 ‫Right. 48 00:02:43,600 --> 00:02:48,880 ‫That's that's both everything to this, to these are basic operations, layer seven, reverse proxies. 49 00:02:49,240 --> 00:02:54,460 ‫We don't have to terminate this anymore and we can do layer seven. 50 00:02:54,460 --> 00:02:58,120 ‫Beautiful load balancing round-robin. 51 00:02:58,390 --> 00:03:08,860 ‫I hash all that jazz without actually micro services, Canario deployment, BlueGreen deployment, everything 52 00:03:09,070 --> 00:03:10,540 ‫you can do it with. 53 00:03:10,810 --> 00:03:16,070 ‫OK, this feels like an ad guys, as this is not an act for morphic encryption. 54 00:03:16,420 --> 00:03:20,580 ‫Obviously it has pros and cons and I didn't talk about that. 55 00:03:20,680 --> 00:03:27,730 ‫Obviously the proses da I can, I can perform operations on an encrypted data privacy Yik Yak. 56 00:03:27,730 --> 00:03:30,590 ‫Good, good stuff right there. 57 00:03:30,600 --> 00:03:33,580 ‫The bad thing about is just too -- slow. 58 00:03:33,580 --> 00:03:38,380 ‫And we're going to show you searching just a few hundred records takes almost like three minutes. 59 00:03:40,120 --> 00:03:42,120 ‫We get to show is the slope. 60 00:03:42,130 --> 00:03:45,730 ‫Yeah I know, but I'm just so excited about this technology. 61 00:03:45,730 --> 00:03:48,580 ‫I am so excited, so pumped by this. 62 00:03:48,580 --> 00:03:48,940 ‫All right. 63 00:03:49,300 --> 00:03:51,550 ‫So, yeah, we can do all that stuff. 64 00:03:51,640 --> 00:03:51,940 ‫Yes. 65 00:03:51,940 --> 00:03:54,070 ‫I'm in or out of traffic based on rules. 66 00:03:54,550 --> 00:04:00,760 ‫I can't wait for the first data Homma morphic database engine. 67 00:04:00,790 --> 00:04:05,230 ‫I can't wait for the first homo merfolk reverse proxy. 68 00:04:05,380 --> 00:04:09,550 ‫I can't wait for the first homo merfolk web server. 69 00:04:09,910 --> 00:04:19,270 ‫Man, this is going to be epic or maybe it's going to flop UNOS because I made a prediction in the past. 70 00:04:19,270 --> 00:04:25,300 ‫I mean, they all failed databases can index and optimize without the decrypting the data. 71 00:04:26,050 --> 00:04:28,980 ‫Let's say you don't trust the cloud provider to take your data. 72 00:04:28,990 --> 00:04:30,520 ‫This man, this is great. 73 00:04:30,880 --> 00:04:38,110 ‫You can upload your data encrypted to a cloud provider and not worry about your data getting leaked 74 00:04:38,230 --> 00:04:40,300 ‫because you you're going to have the same trache. 75 00:04:40,330 --> 00:04:44,230 ‫Only you nobody is allowed to decrypt it. 76 00:04:44,500 --> 00:04:44,860 ‫Right. 77 00:04:44,980 --> 00:04:50,810 ‫Only your client application eventually will allow will have the encryption keys. 78 00:04:50,830 --> 00:04:54,070 ‫It's almost like true, true, true, true. 79 00:04:54,220 --> 00:04:56,590 ‫End to end encryption. 80 00:04:57,430 --> 00:05:00,460 ‫Man, I'm so pumped with this thing.