gosh it's yet another prompt engineering hack for MS Copilot, what a shock
at least this one's one-click instead of zero-click, well done MS
gosh it's yet another prompt engineering hack for MS Copilot, what a shock
at least this one's one-click instead of zero-click, well done MS
@davidgerard trusting unsanitised user inputs? Have we learnt nothing from 30 years of the web?
@davidgerard This shouldn’t be any kind of news, just the default assumption. Any data used with MicroSlop software goes into data centers to be used by / sold to whoever + govt. All of it.
@davidgerard What a time to be a security researcher. Decades of careful advances in computer security have been fired into the sun by people who only care about this quarter's numbers. On the one hand it's probably a bit depressing, but on the other it must be like waking up in an orchard full of extremely ripe and very low-hanging fruit.
"What if we just...asked it twice?" LOL.
Continue reading for ... recommendations on staying safe from emerging AI-related threats.
Pick me! Pick me! I know this one. Is it, "Don't use Co-Pilot"?
@rvedotrc @davidgerard The next question is: If you don't use Co-Pilot, how do you know Co-Pilot isn't active in the background? Is there really any way to eliminate Co-Pilot? I suspect, this data mining is going whether use Co-Pilot or not.
@SteveJB @davidgerard Sounds like a Windows problem. Not my area of expertise.
@rvedotrc @davidgerard Well, it was a rhetorical question. I've been using Linux at home since the late 90s. I had to use Windoze at work, but I retired before the company started using win11. On my work computer, I disabled copilot the same day I learned about it. But I never felt 'safe' using windoze.
Double-request technique
Although Copilot enforces safeguards to prevent direct data leaks, these protections apply only to the initial request. An attacker can bypass these guardrails by simply instructing Copilot to repeat each action twice.
Amazing, you don't even need to add "sudo"; you just say "make me a sandwich" again.
@davidgerard For those of a more visual persuasion.
“Double-request technique
Although Copilot enforces safeguards to prevent direct data leaks, these protections apply only to the initial request. An attacker can bypass these guardrails by simply instructing Copilot to repeat each action twice. “
😳
😂😂😂😂😂😂😂😂😂😂😂
@davidgerard meanwhile, every time I try to add an attachment to an email Microsoft asks me if I want to upload to OneDrive instead.