Articles tagged "Security"

Articles tagged with "Security"

Social Engineering an LLM
20 min read

Social Engineering an LLM

LLMs are getting better, they say. And I agree. I'm finding them to be more helpful with coding now than a few years ago. They retain context a little better, drift less, and tend to hallucinate less. But what happens when someone with malicious intent uses the same techniques that make LLMs helpful to manipulate them into crossing ethical boundaries?

AISecurity
You share your life on Facebook...
3 min read

You share your life on Facebook...

Somewhat related to the “if you’ve got nothing to hide, you’ve got nothing to fear” argument.

Data RetentionData SovereigntyOpinionPoliticsPrivacySecuritySurveillance
Why I Moved from Signal to WhatsApp
5 min read

Why I Moved from Signal to WhatsApp

It's probably one of the major contributors to making secure, encrypted, safe communication accessible to all. I recommend it to anyone, if you're not already encrypting your communications.

FreedomOpen SourceOpinionPrivacySecurity
How Apple can Ethically unlock the iPhone for the FBI
4 min read

How Apple can Ethically unlock the iPhone for the FBI

### Preamble

TechnologyPrivacySecurity
CitizenFour
4 min read

CitizenFour

I wasn't sure what to expect; I'd been keeping up to date with the information Edward Snowden had released to Laura Poitras and Glenn Greenwald already, as has most of the world. Similarly, I had read...

Civil LibertiesEdward SnowdenOpinionPrivacySecurity
Is Fingerprint Authentication Breeding Insecurity?
9 min read

Is Fingerprint Authentication Breeding Insecurity?

So, should you be concerned about the security implications of giving your fingerprint to your phone?

Data SovereigntyPrivacySecurityTechnology
The Nothing to Hide argument
11 min read

The Nothing to Hide argument

"If you aren't doing anything illegal why would you care if someone captures your license plate number?" "If I'm not doing anything illegal, why do the police need to record my license plate number?" ...

TechnologyPrivacySecurity
Privacy and Security in a Mobile Phone World
12 min read

Privacy and Security in a Mobile Phone World

This question, though, was met with silence, a pause, a smile and a one line response: "I'll have to write a whole blog post about that topic!"

TechnologyPrivacySecurity
Making the Switch from Google
3 min read

Making the Switch from Google

My problem now is they know too much. Yes, they already know a lot, but so far they only know what I make public. Now they want to know my secrets. They've indexed every web page my name appears on al...

Data OwnershipLegalOpen SourcePrivacyPrivacySecurity
4 min read

Will Cloud Computing Violate your Privacy and Security?

That's what I understood from the show. I'm not entirely sure how Chrome fits in to the equation, but I'll get to that later.

TechnologyPrivacySecurity
2 min read

Never trust your users!

This could mean asking the user if they're sure that the want to delete an appointment from their calendar, checking a provided email address is valid or prompting them to save changes before moving t...

TechnologySecurityWork
1 min read

How strong is your password?

Having played around with it a bit, it's great for telling if a given password is strong, but don't worry too much if it tells you its weak.

SecurityTechnologyEducation