Pyrzout
(@)joz1264(@)social.skynetcloud.site

The AI Fix #53: An AI uses blackmail to save itself, and threats make AIs work better – Source: grahamcluley.com https://ciso2ciso.com/the-ai-fix-53-an-ai-uses-blackmail-to-save-itself-and-threats-make-ais-work-better-source-grahamcluley-com/ #grahamcluley.com #0CISO2CISO

CISO2CISO.COM & CYBER SECURITY GROUP · 1hThe AI Fix #53: An AI uses blackmail to save itself, and threats make AIs work better – Source: grahamcluley.comSource:

https://social.skynetcloud.site/@jos1264/114627831652921905

The AI Fix #53: An AI uses blackmail to save itself, and threats make AIs work better – Source: grahamcluley.com

Source: grahamcluley.com - Author: Graham Cluley Skip to content

CISO2CISO.COM & CYBER SECURITY GROUP

Interesting: AI decieves on purpose - it's a fun show/pod that's interesting at the same time. Give it a go - laugh and learn at the same time.
#theaifix #GrahamCluley #MarkStockley #podcast #IT #AI #funny

Listen at https://podcasts.apple.com/us/podcast/ais-deliberate-deceptions-and-elons-unhinged-mode/id1753381111?i=1000683949435 or at
https://youtu.be/Qkhl3gwkRWc?si=roElF_sSrUzbvuGO

AI’s deliberate deceptions, and Elon's "unhinged" mode

Podcast Episode · The AI Fix · 01/14/2025 · 41m

Apple Podcasts

DIRECT MESSAGING

DMs on Mastodon work differently than on other platforms.

Graham Cluley, a well-respected British security blogger with a sharp sense of humor (and host of the Smashing Security podcast) has this to say:

“Imagine you are having a direct message conversation with someone on Mastodon about a sensitive subject.

Maybe George and Paul are bantering via direct message on Mastodon, and one of them says “I’ll tell you who’s a twit. That bloody @Ringo”

Well, because @Ringo has been mentioned in the chat, he now sees a copy of the message too. Ouch, that’s awkward.

This would be particularly dangerous if you were communicating with another Mastodon user to report abusive behaviour. Suddenly your abuser knows you are complaining about them.

Email doesn’t work like that. Twitter direct messages don’t work like that.

(Sorry Ringo for using your name in this example, Peace and Love man!)”

https://grahamcluley.com/mastodon-what-you-need-to-know-for-your-security-and-privacy/

Marcus Hutchins pointed out -- in his excellent overview “A Twitter User's Guide to Mastodon”:

“Something to also be wary of is similar to how Twitter staff can read your DMs, so can Mastodon instance staff. If you send a DM to someone on another instance, both the staff on the sending and receiving instance could read your message if they wanted to. Just like on any social media platform, I do not advise using DMs to share sensitive information. Use DMs for normal discussions, or exchanging contacts. Any sensitive information should be sent via an End-to-end encrypted messaging app like Signal, WhatsApp, Telegram, or Wire.”

[Note: Some concern around Whatsapp and Telegram has been raised. Perhaps it would be best to dig into the details online, and choose your private messaging app with care.]

https://escapingtech.com/tech/guides/a-twitter-users-guide-to-mastodon.html

@gcluley
#SmashingSecurity
#GrahamCluley
@malwaretech
#MarcusHutchins
#DirectMessages
#DMs

Mastodon: What you need to know for your security and privacy

Mastodon is hot right now. After some years of only being used by geeks (yes, I’ve had an account for a while now) it’s at the tipping point of becoming…

Graham Cluley

DIRECT MESSAGING

DMs on Mastodon work differently than on other platforms.

Graham Cluley, a well-respected British security blogger with a sharp sense of humor (and host of the Smashing Security podcast) has this to say:

“Imagine you are having a direct message conversation with someone on Mastodon about a sensitive subject.

Maybe George and Paul are bantering via direct message on Mastodon, and one of them says “I’ll tell you who’s a twit. That bloody @Ringo”

Well, because @Ringo has been mentioned in the chat, he now sees a copy of the message too. Ouch, that’s awkward.

This would be particularly dangerous if you were communicating with another Mastodon user to report abusive behaviour. Suddenly your abuser knows you are complaining about them.

Email doesn’t work like that. Twitter direct messages don’t work like that.

(Sorry Ringo for using your name in this example, Peace and Love man!)”

https://grahamcluley.com/mastodon-what-you-need-to-know-for-your-security-and-privacy/

Marcus Hutchins pointed out -- in his excellent overview “A Twitter User's Guide to Mastodon”:

“Something to also be wary of is similar to how Twitter staff can read your DMs, so can Mastodon instance staff. If you send a DM to someone on another instance, both the staff on the sending and receiving instance could read your message if they wanted to. Just like on any social media platform, I do not advise using DMs to share sensitive information. Use DMs for normal discussions, or exchanging contacts. Any sensitive information should be sent via an End-to-end encrypted messaging app like Signal, WhatsApp, Telegram, or Wire.”

https://escapingtech.com/tech/guides/a-twitter-users-guide-to-mastodon.html

@gcluley
#SmashingSecurity
#GrahamCluley
@malwaretech
#MarcusHutchins
#DirectMessages
#DMs

👂

#Mastodon
#GCHQ
#GrahamCluley

Here's the indefatigable Graham Cluley

@gcluley

on his regular podcast on matters tech, with a #Mastodon101 slot:
✴️
https://grahamcluley.com/smashing-security-podcast-297/
✴️

Smashing Security podcast #297: Mastodon 101, and the Hushpuppi saga

Graham offers some security and privacy advice for those exodusing Twitter to Mastodon, and Carole slams the door shut on a notorious scammer with a huge…

Graham Cluley

Graham Cluley is a computer security expert, blogger and co-host of the excellently funny Smashing Security podcast. You can follow at:

➡️ @gcluley

Cluley's blog is at https://grahamcluley.com and the podcast is at https://www.smashingsecurity.com

#GrahamCluley #Computing #Privacy #Security #CyberSecurity #InfoSec #Podcast #Podcasts #Podcasting #Blog #Blogs #Blogging #Bloggers

Graham Cluley - Computer security news, advice, and opinion

Computer security keynote speaker Graham Cluley offers cybersecurity news, advice, and opinion.

Graham Cluley
Log4Shell: Eine Sicherheitslücke erschüttert das Internet

Die Log4Shell Sicherheitslücke ermöglicht die Kontrolle von Millionen an Geräten. Wir haben alle wichtigen Informationen für euch gesammelt.

Tarnkappe.info

Graham Cluley is a computer security expert and infosec blogger who co-hosts the amusing (and sometimes smutty 😁) "Smashing Security" podcast. You can follow him on the Fediverse at:

➡️ @gcluley

Cluley's blog is at https://grahamcluley.com

The podcast is at https://www.smashingsecurity.com

#GrahamCluley #InfoSec #Security #Privacy #Computing #Technology #News #ComputerSecurity #CyberSecurity #CyberCrime #Internet #BlackHat #WhiteHat #Podcasts #Podcasting #Podcast

Graham Cluley - Computer security news, advice, and opinion

Computer security keynote speaker Graham Cluley offers cybersecurity news, advice, and opinion.

Graham Cluley

Graham Cluley is a well-known blogger on computer security, and co-presents a podcast about it called "Smashing Security". You can follow at:

➡️ @gcluley

The blog is at https://grahamcluley.com

The podcast is at https://www.smashingsecurity.com

#GrahamCluley #Computing #News #Technology #InfoSec #Internet #Information #Security #Online #Privacy #Data #CyberSecurity #ComputerSecurity #Hacking #Hackers #Crackers #BlackHat

Graham Cluley - Computer security news, advice, and opinion

Computer security keynote speaker Graham Cluley offers cybersecurity news, advice, and opinion.

Graham Cluley
“Rebooting” – a video chat with Lisa Forte - Lisa Forte interviews me about how someone once turned me into a computer virus, some of the ethic... more: https://www.grahamcluley.com/rebooting-a-video-chat-with-lisa-forte/ #securitythreats #grahamcluley #lisaforte #rebooting #youtube #video
Graham Cluley "Rebooting" with Lisa Forte

Lisa Forte interviews me about how someone once turned me into a computer virus, some of the ethical issues that come out of blogging about security, and what you say when hackers contact you asking for help in blackmailing their victims.