-1 points

No shit, Sherlock!

permalink
report
reply
14 points

Do we know if local models are any safer or is that a trust me bro?

permalink
report
reply
27 points

well we’re talking about data across a company. Tho apparently it does send stuff back to MS as well, because of course it does.

permalink
report
parent
reply
4 points

Best way to deal with it? What’s the modern solution here

permalink
report
parent
reply
23 points
  • don’t use any of this stupid garbage
  • if you’re forced to deploy this stupid garbage, treat RAG like a poorly-secured search engine index (which it pretty much is) or privacy-hostile API and don’t feed anything sensitive or valuable into it
  • document the fuck out of your objections because this stupid garbage is easy to get wrong and might fabricate liability-inducing answers in spite of your best efforts
  • push back hard on making any of this stupid garbage public-facing, but remember that your VPN really shouldn’t be the only thing saving you from a data breach
permalink
report
parent
reply
-4 points
*

You can download multiple LLM models yourself and run them locally. It’s relatively straightforward;

https://ollama.com/

Then you can switch off your network after download, wireshark the shit out of it, run it behind a proxy, etc.

permalink
report
parent
reply
8 points

you didn’t need to give random llms free advertising to make your point, y’know

permalink
report
parent
reply
12 points

Local models are theoretically safer, by virtue of not being connected to the company which tried to make Recall a thing, but they’re still LLMs at the end of the day - they’re still loaded with vulnerabilities, and will remain a data breach waiting to happen unless you make sure its rendered basically useless.

permalink
report
parent
reply
19 points
*

I was particularly proud of finding that MS office worker photo, of all the MS office worker photos I’ve seen that one absolutely carries the most MS stench

permalink
report
reply
-3 points

Yeah, if you leave a web-connected resource open to the internet, then you create a vulnerability for leaking data to the internet. No shit. Just like other things that you don’t want public, you have to set it to not be open to the internet.

permalink
report
reply
10 points

no matter how you hold it, you’re holding it wrong:

“It’s kind of funny in a way - if you have a bot that’s useful, then it’s vulnerable. If it’s not vulnerable, it’s not useful,” Bargury said.

permalink
report
parent
reply
6 points
*

have you considered "git"ing “gud” at posting

permalink
report
parent
reply
1 point
Deleted by creator
permalink
report
parent
reply
43 points
*

Microsoft’s excuse is that many of these attacks require an insider.

Sure we made phishing way easier, more dangerous, and more subtle; but it was the user’s fault for trusting our Don’t Trust Anything I Say O-Matic workplace productivity suite!

Edit: and really from the demos it looks like a user wouldn’t have to do anything at all besides write “summarize my emails” once. No need to click on anything for confidential info to be exfiltrated if the chatbot can already download arbitrary URLs based on the prompt injection!

permalink
report
reply
5 points

and really from the demos it looks like a user wouldn’t have to do anything at all besides write “summarize my emails” once. No need to click on anything for confidential info to be exfiltrated if the chatbot can already download arbitrary URLs based on the prompt injection!

We’re gonna see a whole lotta data breaches in the upcoming months - calling it right now.

permalink
report
parent
reply

TechTakes

!techtakes@awful.systems

Create post

Big brain tech dude got yet another clueless take over at HackerNews etc? Here’s the place to vent. Orange site, VC foolishness, all welcome.

This is not debate club. Unless it’s amusing debate.

For actually-good tech, you want our NotAwfulTech community

Community stats

  • 1.4K

    Monthly active users

  • 430

    Posts

  • 11K

    Comments

Community moderators