Great article.<p>Can someone smarter than me explain why an embedding is or isn't a poor man's form of encryption? You can retrieve the closeness to something using cosine similarity, but you can't go back to the original source (unless you store the embedding side by side, which is what most people do with those vectors).<p>But, isn't using an embedding model a good way to cloak your original data and still make it comparable?