• 0 Posts
  • 13 Comments
Joined 1 year ago
cake
Cake day: July 26th, 2023

help-circle





  • Given that personal sensitive data doesn’t leave a device except when authorised, a bad actor would need to access a target’s device or somehow identify and compromise the specific specially hardened Apple silicon server, which likely does not have any of the target’s data since it isn’t retained after computing a given request.

    Accessing someone’s device leads to greater threats than prompt injection. Identifying and accessing a hardened custom server at the exact time data is processed is exceptionally difficult as a request. Outside of novel exploits of a user’s device during remote server usage, I suspect this is a pretty secure system.