This is a very nice and complete break of InstaHide by some of my Google colleagues and others: https://arxiv.org/abs/2011.05315 

TL;DR: This scheme does not work, as the "encrypted" images can be largely recovered. ☹️

1/5
I don't want to pick on InstaHide, but the original paper invited comparison with differential privacy, so I think it's necessary to respond to that. The following comment is also not specific to this paper.

2/5
Differential Privacy provides a clear privacy guarantee.

Maybe you don't like that guarantee - maybe it's too strong, too weak, or not applicable to your setting. That's fine.

The point is that there *is* a guarantee to consider, object to, or build upon.

3/5
If you are going to propose some alternative to differential privacy, then you should be clear about the privacy guarantee.

Only that way you can make a meaningful comparison.

And I think that's necessary to advance the field.

4/5
To be clear, I don't think it's necessary to make everything 100% theoretically rigorous with lemmas and proofs. But the assumptions should be made clear and falsifiable.

Generally, the more rigorous you make something, the more likely it is to stand up to scrutiny.

5/5
You can follow @shortstein.
Tip: mention @twtextapp on a Twitter thread with the keyword “unroll” to get a link to it.

Latest Threads Unrolled:

By continuing to use the site, you are consenting to the use of cookies as explained in our Cookie Policy to improve your experience.