Markdown Version | Session Recording
Session Date/Time: 23 Jul 2024 00:30
pearg
Summary
This session included two presentations. The first presentation was by Stefano on "Moulting Point," a system for evaluating the performance of language transformers on mobile devices. The second presentation was by Anton Fusanko on the Aryan Protocol, a privacy-preserving network layer protocol.
Key Discussion Points
- Moulting Point Presentation:
- Discussion on deploying machine learning models on devices, including challenges related to system heterogeneity, simultaneous workloads, download latency, and sustained performance.
- Exploration of the trade-offs between model size, accuracy, and deployability on mobile devices.
- Analysis of the impact of quantization on model accuracy and performance.
- Inquiry about the model performance for LLMs shipped by OS vendors like Apple or Google and first vs third party applications.
- Questioning about accuracy of the LLMs versus performance, with specific concern about breaking guardrails and hallucinations.
- Aryan Protocol Presentation:
- The protocol aims to provide anonymity for the source and prevent association of consecutive packets to the same flow.
- Design choices, including symmetric key cryptography for performance and source routing, are discussed along with their trade-offs.
- The use of anonymous key references and routing element shuffling to enhance privacy is explained.
- Questions about formal proofs of security and prevention of correlation attacks.
- Clarification that the formal aspects relate to formal description of the protocol, not formal verification.
Decisions and Action Items
- Research Group Last Call: Chairs intend to perform a research group last call on the discussed draft in the next few weeks. People are encouraged to express strong opposition or opinions very soon.
Next Steps
- The presenters will likely continue developing and refining their respective projects based on the feedback received during the session.
- Further research and development on techniques to prevent correlation attacks are encouraged.
- Aryan protocol to be adapted into an IETF protocol (IPv6 extension header or new quick version).