(no title)
hpcjoe | 2 years ago
I'm not much worried about this specific example of information exfiltration, though I have significant concerns over how one may debug something like this for applications working with potentially more sensitive data than email signatures. Put another way, I think we are well within the infancy of this technology, and there is far more work needed before we have actually useful applications that have a concept of information security relative to their training data sets.
Aurornis|2 years ago
If you Google parts of the old signature, do you get any results?