Reach

joined 1 year ago
[–] [email protected] 3 points 2 weeks ago

StarCraft 2

[–] [email protected] 2 points 2 weeks ago* (last edited 2 weeks ago)

Woke is an adjective derived from African-American Vernacular English originally meaning alertness to racial prejudice and discrimination.

Source: Wikipedia

Yes it's woke. Yes that's good. I'll never shy away from calling out the right's ridiculous demonisation of anti-racism...


Edit: Also yea, I bet Nigel Farage or some other Reform fool is already yelling into the void about this.

[–] [email protected] 0 points 2 weeks ago (2 children)

Which app or ui is the screenshot from?

[–] [email protected] 4 points 3 weeks ago (1 children)

Of course you should vote. It's exhausting having to state the obvious though, so thanks for trying.

[–] [email protected] 2 points 4 weeks ago

Let’s goooooo!!!

[–] [email protected] 3 points 2 months ago

Excellent citation! Thanks for sharing!

[–] [email protected] 1 points 2 months ago

I miss that game

[–] [email protected] 4 points 2 months ago (1 children)

My gender, or other genders, both are good ✨

[–] [email protected] 1 points 2 months ago

We’re getting there ✨

[–] [email protected] 2 points 3 months ago* (last edited 3 months ago) (1 children)

Good example, I hope confirmation will be crucial and hopefully required before actions like this are taken by the device. Additionally I hope the prompt is phrased securely to make clear during parsing that the website text is not a user request. I imagine further research will highlight more robust prompting methods to combat this, though I suspect it will always be a consideration.

[–] [email protected] 15 points 3 months ago* (last edited 3 months ago) (3 children)

Given that personal sensitive data doesn’t leave a device except when authorised, a bad actor would need to access a target’s device or somehow identify and compromise the specific specially hardened Apple silicon server, which likely does not have any of the target’s data since it isn’t retained after computing a given request.

Accessing someone’s device leads to greater threats than prompt injection. Identifying and accessing a hardened custom server at the exact time data is processed is exceptionally difficult as a request. Outside of novel exploits of a user’s device during remote server usage, I suspect this is a pretty secure system.

 

TransActual are today publishing an analysis of the flaws in the Cass Report’s approach and conclusions.

I’m glad this is here. It’s reassuring to see people calling this report out for what it is. And with linked evidence to back up the criticism too.

view more: next ›