Reach

joined 1 year ago
[–] [email protected] 2 points 1 month ago (1 children)

Started playing Star Trucker - it's pretty interesting, reminds me a lot of the cargo hauling loop in Star Citizen. The differece is that this doesn't crash anywhere near as much, runs on my Steam Deck, and boots a lot quicker too.

[–] [email protected] 3 points 2 months ago

StarCraft 2

[–] [email protected] 0 points 2 months ago (2 children)

Which app or ui is the screenshot from?

[–] [email protected] 4 points 2 months ago (1 children)

Of course you should vote. It's exhausting having to state the obvious though, so thanks for trying.

[–] [email protected] 2 points 2 months ago

Let’s goooooo!!!

[–] [email protected] 3 points 4 months ago

Excellent citation! Thanks for sharing!

[–] [email protected] 1 points 4 months ago

I miss that game

[–] [email protected] 5 points 4 months ago (1 children)

My gender, or other genders, both are good ✨

[–] [email protected] 1 points 4 months ago

We’re getting there ✨

[–] [email protected] 2 points 5 months ago* (last edited 5 months ago) (1 children)

Good example, I hope confirmation will be crucial and hopefully required before actions like this are taken by the device. Additionally I hope the prompt is phrased securely to make clear during parsing that the website text is not a user request. I imagine further research will highlight more robust prompting methods to combat this, though I suspect it will always be a consideration.

[–] [email protected] 15 points 5 months ago* (last edited 5 months ago) (3 children)

Given that personal sensitive data doesn’t leave a device except when authorised, a bad actor would need to access a target’s device or somehow identify and compromise the specific specially hardened Apple silicon server, which likely does not have any of the target’s data since it isn’t retained after computing a given request.

Accessing someone’s device leads to greater threats than prompt injection. Identifying and accessing a hardened custom server at the exact time data is processed is exceptionally difficult as a request. Outside of novel exploits of a user’s device during remote server usage, I suspect this is a pretty secure system.

 

TransActual are today publishing an analysis of the flaws in the Cass Report’s approach and conclusions.

I’m glad this is here. It’s reassuring to see people calling this report out for what it is. And with linked evidence to back up the criticism too.

 

PinkNews examines five key takeaways, concerns and questions following the publication of the Cass report into trans youth healthcare.

view more: next ›