International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

How To Think About End-To-End Encryption and AI: Training, Processing, Disclosure, and Consent

Authors:
Mallory Knodel
Andrés Fábrega
Daniella Ferrari
Jacob Leiken
Betty Li Hou
Derek Yen
Sam de Alfaro
Kyunghyun Cho
Sunoo Park
Download:
Search ePrint
Search Google
Presentation: Slides
Abstract: We raise concerns for end-to-end encryption (E2EE) security in light of the remarkable recent advances and explosion of interest in large language models and generative artificial intelligence (AI). Apple has already announced an initiative to feed E2EE messages into AI systems, and other major platforms may be considering similar efforts. Combining expertise across cryptography, AI, and law, we (1) examine a wide range of technical configurations that could fall under the broad umbrella of “feeding E2EE content to AI models,” taking into consideration the state of the art in cryptography, privacy technologies, and AI/ML, (2) assess these configurations’ technical compatibility with E2EE; (3) overview potentially relevant areas of law, and provide a detailed analysis of the circumstances under which E2EE service providers are likely to be able to offer AI features which use E2EE content; and (4) offer four key recommendations, which amount to a framework for how to think about offering AI features in E2EE systems.
Video: https://youtu.be/ceuiGJWIv38
BibTeX
@misc{rwc-2025-35884,
  title={How To Think About End-To-End Encryption and AI: Training, Processing, Disclosure, and Consent},
  note={Video at \url{https://youtu.be/ceuiGJWIv38}},
  howpublished={Talk given at RWC 2025},
  author={Mallory Knodel and Andrés Fábrega and Daniella Ferrari and Jacob Leiken and Betty Li Hou and Derek Yen and Sam de Alfaro and Kyunghyun Cho and Sunoo Park},
  year=2025
}