2 Followers
18 Following
10 Posts
Co-author of the defensive security handbook 2nd edition; Ham - KB1HAX building on meshtastic; focused on securing everything that should come out of your development pipeline.
EXCLUSIVE: The Pentagon is considering severing its relationship with Anthropic over the AI firm's insistence on maintaining some limitations on how the military uses its models. https://t.co/tBR1L7qLDa
Exclusive: Pentagon threatens to cut off Anthropic in AI safeguards dispute

Anthropic has not agreed to the Pentagon's terms and defense officials are getting fed up after months of difficult negotiations.

Axios
@GossiTheDog How is this not a form of prompt injection? #1 on the top 10 for llm apps?
@GossiTheDog looks like a lot of honeypots on shodan (i hope)
@GossiTheDog from a threat actor perspective this is creating a gold mine of threat surface.

@GossiTheDog In the same way that bloodhound lets attackers automate the discovery of attack paths, it feels like many of the enterprise LLM tools being deployed that index and RAG enterprise data are creating equal and unauditable mechanisms to identify sensitive data.

Step one has also needed to be implementation of rigorous RBAC and IAM mechanisms to control who has access to sensitive data; but heck even at the user level its rare that I’ve even seen LLM applications architected in a way that considers per-user RBAC at the vector/rag level let alone implemented rigorously at the data store level.

@GossiTheDog remind me of something involving Lehman, AIG, Citi, Goldman, Fannie, and Freddie
@2600 Hey all, just wanted to let you know that where ever you decide to move the venue to next, EmeraldCon (you know us degens over all the Emerald Pub) are fully committed to follow you and create an equal and welcoming atmosphere regardless of where you decide to host. You have our full support.