GNU social JP
  • FAQ
  • Login
GNU social JPは日本のGNU socialサーバーです。
Usage/ToS/admin/test/Pleroma FE
  • Public

    • Public
    • Network
    • Groups
    • Featured
    • Popular
    • People

Notices by Seyd (seyd@declin.eu)

  1. Embed this notice
    Seyd (seyd@declin.eu)'s status on Thursday, 23-Jan-2025 17:40:27 JST Seyd Seyd
    in reply to
    • Rich Felker
    Right now, on a planetary scale, personal data is being collected, financial information is being stolen, and devices are being used for DDoS attacks or cryptocurrency mining. This is a common problem. Will AI become a disaster for end-to-end encryption? No. The issues with end-to-end encryption lie in the realm of computational complexity, not in whether your data is being stolen by a regular keylogger or AI.

    By the way, my avatar was created by AI, and this message was also translated by AI. Has this knowledge changed your attitude towards the drawing and the text?
    In conversation about 4 months ago from declin.eu permalink
  2. Embed this notice
    Seyd (seyd@declin.eu)'s status on Thursday, 23-Jan-2025 16:50:01 JST Seyd Seyd
    in reply to
    • Rich Felker
    I don't understand why to write here about certain things, but please don't explain it to me. I don't want to give a reason for the continuation of any ideological discussion. By the way, your message resembles an AI product — a lot of fluff, but little substance.

    The issue of privacy is much deeper, and AI doesn't fundamentally change anything here. Even without AI, you can't be sure about the security of your phone. The software has grown to enormous sizes, and auditing tens of gigabytes is difficult. Users can install additional software, and there are many specialized processors in phones that can affect privacy.

    Cybercriminals sell infected devices on marketplaces. Often, manufacturers themselves install firmware with malware on devices.

    https://iz.ru/1823322/dmitrii-bulgakov/nanesti-zarazenie-kak-tehnika-s-marketpleisov-stanovitsa-istocnikom-virusov

    https://www.wired.com/story/android-tv-streaming-boxes-china-backdoor/

    AI is just another ingredient in this complex issue.
    In conversation about 4 months ago from declin.eu permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: media.wired.com
      Your Cheap Android TV Streaming Box May Have a Dangerous Backdoor
      from Matt Burgess
      New research has found that some streaming devices and dozens of Android and iOS apps are secretly being used for fraud and other cybercrime.
    2. Domain not in remote thumbnail source whitelist: cdn.iz.ru
      Нанести заражение: как техника с маркетплейсов становится источником вирусов
      from Дмитрий Булгаков
      Вредоносное ПО крадет финансовую информацию и личные данные
  3. Embed this notice
    Seyd (seyd@declin.eu)'s status on Thursday, 23-Jan-2025 15:03:43 JST Seyd Seyd
    in reply to
    • Soatok Dreamseeker
    • Matthew Green
    @soatok @matthew_d_green

    If the client's plaintext is sent to the AI before encryption, then there can be no talk of end-to-end encryption. This creates a similar threat to the presence of keyloggers and sniffers, making the client environment vulnerable.

    Thus, the question of whether AI will pose a threat to end-to-end encryption is irrelevant, as end-to-end encryption does not address the issue of malware. Other protective measures must be employed to deal with this threat model.
    In conversation about 4 months ago from declin.eu permalink

User actions

    Seyd

    Seyd

    According to my horoscope, I am a lynx

    Tags
    • (None)

    Following 0

      Followers 0

        Groups 0

          Statistics

          User ID
          320890
          Member since
          23 Jan 2025
          Notices
          3
          Daily average
          0

          Feeds

          • Atom
          • Help
          • About
          • FAQ
          • TOS
          • Privacy
          • Source
          • Version
          • Contact

          GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.

          Creative Commons Attribution 3.0 All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.