• 1 Post
  • 28 Comments
Joined 3 年前
cake
Cake day: 2023年7月26日

help-circle











  • Given that personal sensitive data doesn’t leave a device except when authorised, a bad actor would need to access a target’s device or somehow identify and compromise the specific specially hardened Apple silicon server, which likely does not have any of the target’s data since it isn’t retained after computing a given request.

    Accessing someone’s device leads to greater threats than prompt injection. Identifying and accessing a hardened custom server at the exact time data is processed is exceptionally difficult as a request. Outside of novel exploits of a user’s device during remote server usage, I suspect this is a pretty secure system.