phiresky@lemmy.world to Programmer Humor@lemmy.ml · 11 months agoHacking in 1980 vs Hacking in 2024lemmy.worldimagemessage-square8fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1imageHacking in 1980 vs Hacking in 2024lemmy.worldphiresky@lemmy.world to Programmer Humor@lemmy.ml · 11 months agomessage-square8fedilink
minus-squarePoggervania@kbin.sociallinkfedilinkarrow-up1·11 months agoThere’s some sort of cosmic irony that some hacking could legitimately just become social engineering AI chatbots to give you the password
minus-squareresidentmarchant@lemmy.worldlinkfedilinkEnglisharrow-up0·11 months agoThere’s no way the model has access to that information, though. Google’s important product must have proper scoped secret management, not just environment variables or similar.
minus-squarenomecks@lemmy.worldlinkfedilinkarrow-up0·11 months agoThere’s no root login. It’s all containers.
minus-squareSpaceNoodle@lemmy.worldlinkfedilinkarrow-up0·11 months agoIt’s containers all the way down!
There’s some sort of cosmic irony that some hacking could legitimately just become social engineering AI chatbots to give you the password
There’s no way the model has access to that information, though.
Google’s important product must have proper scoped secret management, not just environment variables or similar.
There’s no root login. It’s all containers.
It’s containers all the way down!
All the way down.