Skip to content

Google Gemini is coming for your private apps. Here's how to stop it

Technology
30 24 0
  • What is SIEM (Security Information and Event Management)?

    Technology technology
    1
    1
    3 Stimmen
    1 Beiträge
    0 Aufrufe
    Niemand hat geantwortet
  • 9 Stimmen
    6 Beiträge
    25 Aufrufe
    F
    You said it yourself: extra places that need human attention ... those need ... humans, right? It's easy to say "let AI find the mistakes". But that tells us nothing at all. There's no substance. It's just a sales pitch for snake oil. In reality, there are various ways one can leverage technology to identify various errors, but that only happens through the focused actions of people who actually understand the details of what's happening. And think about it here. We already have computer systems that monitor patients' real-time data when they're hospitalized. We already have systems that check for allergies in prescribed medication. We already have systems for all kinds of safety mechanisms. We're already using safety tech in hospitals, so what can be inferred from a vague headline about AI doing something that's ... checks notes ... already being done? ... Yeah, the safe money is that it's just a scam.
  • Rediscovering Human Purpose in the Age of AI

    Technology technology
    2
    1
    3 Stimmen
    2 Beiträge
    17 Aufrufe
    capuccino@lemmy.worldC
    well, it seems that the rich will stay rich, no matter what. It's incredible that people see AI as a religion now
  • 1 Stimmen
    1 Beiträge
    9 Aufrufe
    Niemand hat geantwortet
  • 285 Stimmen
    134 Beiträge
    196 Aufrufe
    I
    I'm not afraid of that at all. But if you draw shit tons of power from a crappy socket, things start to heat up real quick. Like getting really fucking hot, as in burn your house down hot.
  • How a Spyware App Compromised Assad’s Army

    Technology technology
    2
    1
    41 Stimmen
    2 Beiträge
    17 Aufrufe
    S
    I guess that's why you pay your soldiers. In the early summer of 2024, months before the opposition launched Operation Deterrence of Aggression, a mobile application began circulating among a group of Syrian army officers. It carried an innocuous name: STFD-686, a string of letters standing for Syria Trust for Development. ... The STFD-686 app operated with disarming simplicity. It offered the promise of financial aid, requiring only that the victim fill out a few personal details. It asked innocent questions: “What kind of assistance are you expecting?” and “Tell us more about your financial situation.” ... Determining officers’ ranks made it possible for the app’s operators to identify those in sensitive positions, such as battalion commanders and communications officers, while knowing their exact place of service allowed for the construction of live maps of force deployments. It gave the operators behind the app and the website the ability to chart both strongholds and gaps in the Syrian army’s defensive lines. The most crucial point was the combination of the two pieces of information: Disclosing that “officer X” was stationed at “location Y” was tantamount to handing the enemy the army’s entire operating manual, especially on fluid fronts like those in Idlib and Sweida.
  • The AI girlfriend guy - The Paranoia Of The AI Era

    Technology technology
    1
    1
    6 Stimmen
    1 Beiträge
    11 Aufrufe
    Niemand hat geantwortet
  • 178 Stimmen
    75 Beiträge
    10 Aufrufe
    seaqueue@lemmy.worldS
    No, they're absolutely not. Check out tricky store and play integrity fork to see how we're faking a trusted environment on custom and rooted roms. You can pass new device integrity with a valid unrevoked keybox on A13+ and new strong on <A12. It's a new stage in the arms race for sure but it's still possible to bypass until all of the keys used to sign keyboxes are revoked.