• 3 Posts
  • 40 Comments
Joined il y a 3 ans
cake
Cake day: 26 juillet 2023

help-circle














  • Given that personal sensitive data doesn’t leave a device except when authorised, a bad actor would need to access a target’s device or somehow identify and compromise the specific specially hardened Apple silicon server, which likely does not have any of the target’s data since it isn’t retained after computing a given request.

    Accessing someone’s device leads to greater threats than prompt injection. Identifying and accessing a hardened custom server at the exact time data is processed is exceptionally difficult as a request. Outside of novel exploits of a user’s device during remote server usage, I suspect this is a pretty secure system.