Renegade

joined 1 year ago
[–] Renegade@infosec.pub 5 points 4 months ago* (last edited 4 months ago)

Something I often see missing from discussion on privacy is that it's not always about you, the listener. Sometimes it's about protecting the most vulnerable people around you. For example, someone escaping from domestic violence might have a different view on how their information is protected. People struggle to see the value in privacy because it's not been a big problem for them personally or because they think it's hopeless. An introduction to privacy in my view is all about teaching empathy, hope, and advocating for others.

Once they have that goal in mind, you can tie in how open source helps empower people to take back their privacy

[–] Renegade@infosec.pub 1 points 4 months ago* (last edited 4 months ago)

This has nothing to do with the Files app, nor does it have anything to do with re-indexing of the Photos library. This has to do with fighting CSAM. Apple has started (in this or a previous update), to scan your device (including deleted files) for anything containing nudity (search for "brasserie") and adding it to your photos library in a way that it is hidden. That way, anything that the models detect as nudity is stored in your iCloud database permanently. Apple is doing this because it allows them to screen for unknown CSAM material. Currently it can only recognize known fingerprints, but doing this allows them (and the other parties that have access to your iCloud data) to analyze unknown media.

The bug mentioned here accidentally made those visible to the user. The change visible updates the assets in the library in a way that removes the invisibility flag, hence people noticing that there are old nudes in their library that they cannot delete.

...

And speaking of deleting things, things are never really deleted. The iPhone keeps a record of messages you delete and media, inside the KnowledgeC database. This is often used for forensic purposes. Apple is migrating this to the Biome database, which has the benefit of being synchronized to iCloud. It is used to feed Siri with information, among other things. Anything you type into your devices, or fingerprints of anything you view are sent to Apple's servers and saved. Spooky, if you ask me. But the only way we can have useful digital assistants is when they have access to everything, that's just how it works.

Nudes are meant to persist on iPhone. You're just not meant to notice.

[–] Renegade@infosec.pub 1 points 4 months ago

I wonder how good this model would be at an obfuscated code challenge.

[–] Renegade@infosec.pub 3 points 5 months ago

This is all they really said IMO:

My tendency these days is to try to use the term “machine learning” rather than AI

[–] Renegade@infosec.pub 2 points 5 months ago

The initial results showed something that should have been obvious to anyone: *More data beats more parameters.

That makes a lot of sense!

[–] Renegade@infosec.pub 18 points 5 months ago

Might be factoring in more than just state income tax. There's also sales tax, property tax, etc.

[–] Renegade@infosec.pub 5 points 5 months ago* (last edited 5 months ago) (1 children)

Purely speculation but, I wonder if this is a case of having some old, very low quality photos and trying to enhance and upscale them for the show.

[–] Renegade@infosec.pub 4 points 5 months ago

*Ten things that will pad out my list of generic rpg book topics. I definitely didn't start with a clickable title and then fumble coming up with the ten things.

[–] Renegade@infosec.pub 2 points 6 months ago

You can generate your own tracks using bing chat.

[–] Renegade@infosec.pub 1 points 6 months ago* (last edited 6 months ago) (2 children)

All the Suno tracks I've heard have a similar style. Very procedural and formulaic. Calling it AI seams like a stretch.

[–] Renegade@infosec.pub 1 points 6 months ago

Relevant article: https://lemmy.ml/post/12857742

Prompt engineering is a thing, but I wouldn't say it's much of a job title. There are people doing it: optimizing system prompts, preprocessing and postprocessing, llms are just one piece of a complex pipeline and someone has to build all that. Prompt engineering is part the boot strapping for making better llms but this work is largely being done by data scientists who are on the forefront of understanding how AI works.

So is prompt engineering just typing questions? IDK. Who knows what those people mean when they say that but whatever it's called there is a specialized field around improving AI tech and prompt engineering is certainly a part.

[–] Renegade@infosec.pub 2 points 6 months ago* (last edited 6 months ago)

Containers are a really cool part of security. The security provided will depend on how the container is configured. For example if you give the container bridged networking permissions (or whatever equivalent term is used by your solution) then you're giving the container access to communicate with other devices on your local network. This would be the opposite of what you want to do to prevent an attacker from pivoting through your LAN.

Other threats just aren't within the set of protections that can be provided by a container. For example if you wish to protect your Minecraft world from being griefed the container won't have any affect on this. Another example is hiding your IP.

Basically what I'm saying is that whenever you are looking at a security technology think about what guarantees it provides and realize that no single security measure provides protection against all threats.

view more: ‹ prev next ›