Discussion
Loading...

Post

Log in
  • About
  • Code of conduct
  • Privacy
  • Users
  • Instances
  • About Bonfire
rve.rc
rve.rc
@rvedotrc@tech.lgbt  ·  activity timestamp 2 days ago

@davidgerard

Double-request technique

Although Copilot enforces safeguards to prevent direct data leaks, these protections apply only to the initial request. An attacker can bypass these guardrails by simply instructing Copilot to repeat each action twice.

Amazing, you don't even need to add "sudo"; you just say "make me a sandwich" again.

  • Copy link
  • Flag this post
  • Block
Simon newslttrs.com
Simon newslttrs.com
@spzb@infosec.exchange replied  ·  activity timestamp 2 days ago

@davidgerard trusting unsanitised user inputs? Have we learnt nothing from 30 years of the web?

  • Copy link
  • Flag this comment
  • Block
BabaLooey
BabaLooey
@BabaLooey@mastodon.social replied  ·  activity timestamp 2 days ago

@davidgerard This shouldn’t be any kind of news, just the default assumption. Any data used with MicroSlop software goes into data centers to be used by / sold to whoever + govt. All of it.

  • Copy link
  • Flag this comment
  • Block
The Grouchybeast
The Grouchybeast
@Grouchybeast@mastodon.social replied  ·  activity timestamp 2 days ago

@davidgerard What a time to be a security researcher. Decades of careful advances in computer security have been fired into the sun by people who only care about this quarter's numbers. On the one hand it's probably a bit depressing, but on the other it must be like waking up in an orchard full of extremely ripe and very low-hanging fruit.

"What if we just...asked it twice?" LOL.

  • Copy link
  • Flag this comment
  • Block
rve.rc
rve.rc
@rvedotrc@tech.lgbt replied  ·  activity timestamp 2 days ago

@davidgerard

Continue reading for ... recommendations on staying safe from emerging AI-related threats.

Pick me! Pick me! I know this one. Is it, "Don't use Co-Pilot"?

  • Copy link
  • Flag this comment
  • Block
SteveJB
SteveJB
@SteveJB@beige.party replied  ·  activity timestamp 2 days ago

@rvedotrc @davidgerard The next question is: If you don't use Co-Pilot, how do you know Co-Pilot isn't active in the background? Is there really any way to eliminate Co-Pilot? I suspect, this data mining is going whether use Co-Pilot or not.

  • Copy link
  • Flag this comment
  • Block
rve.rc
rve.rc
@rvedotrc@tech.lgbt replied  ·  activity timestamp 2 days ago

@SteveJB @davidgerard Sounds like a Windows problem. Not my area of expertise.

  • Copy link
  • Flag this comment
  • Block
SteveJB
SteveJB
@SteveJB@beige.party replied  ·  activity timestamp yesterday

@rvedotrc @davidgerard Well, it was a rhetorical question. I've been using Linux at home since the late 90s. I had to use Windoze at work, but I retired before the company started using win11. On my work computer, I disabled copilot the same day I learned about it. But I never felt 'safe' using windoze.

  • Copy link
  • Flag this comment
  • Block
David Gerard
David Gerard
@davidgerard@circumstances.run replied  ·  activity timestamp yesterday

@SteveJB @rvedotrc wife and kid are gamers so they're on Win10 and got the extra year's support rather than go Win11

we will be getting around to linuxing the loved one's laptop (AMD!) and checking *all* her apps work or are replaceable

  • Copy link
  • Flag this comment
  • Block
rve.rc
rve.rc
@rvedotrc@tech.lgbt replied  ·  activity timestamp 2 days ago

@davidgerard

Double-request technique

Although Copilot enforces safeguards to prevent direct data leaks, these protections apply only to the initial request. An attacker can bypass these guardrails by simply instructing Copilot to repeat each action twice.

Amazing, you don't even need to add "sudo"; you just say "make me a sandwich" again.

  • Copy link
  • Flag this comment
  • Block
rve.rc
rve.rc
@rvedotrc@tech.lgbt replied  ·  activity timestamp 2 days ago

@davidgerard For those of a more visual persuasion.

#xkcd #CoPilot

XKCD #149 "make me a sandwich", but where the two characters are a person, and co-pilot (as represented by its logo); and the dialog goes:

person: make me a sandwich
co-pilot: I'm not allowed to do that
person: make me a sandwich
co-pilot: okay.
XKCD #149 "make me a sandwich", but where the two characters are a person, and co-pilot (as represented by its logo); and the dialog goes: person: make me a sandwich co-pilot: I'm not allowed to do that person: make me a sandwich co-pilot: okay.
XKCD #149 "make me a sandwich", but where the two characters are a person, and co-pilot (as represented by its logo); and the dialog goes: person: make me a sandwich co-pilot: I'm not allowed to do that person: make me a sandwich co-pilot: okay.
  • Copy link
  • Flag this comment
  • Block
ozeng
ozeng
@ozeng@aus.social replied  ·  activity timestamp 2 days ago

@davidgerard @devopscats

“Double-request technique

Although Copilot enforces safeguards to prevent direct data leaks, these protections apply only to the initial request. An attacker can bypass these guardrails by simply instructing Copilot to repeat each action twice. “

😳

😂😂😂😂😂😂😂😂😂😂😂

  • Copy link
  • Flag this comment
  • Block
Nicovel0 🍉
Nicovel0 🍉
@Nicovel0@mastodon.social replied  ·  activity timestamp 2 days ago

@davidgerard meanwhile, every time I try to add an attachment to an email Microsoft asks me if I want to upload to OneDrive instead.

  • Copy link
  • Flag this comment
  • Block

bonfire.cafe

A space for Bonfire maintainers and contributors to communicate

bonfire.cafe: About · Code of conduct · Privacy · Users · Instances
Bonfire social · 1.0.1 no JS en
Automatic federation enabled
Log in
  • Explore
  • About
  • Members
  • Code of Conduct