top | item 46056206 (no title) winternewt | 3 months ago You're not explaining why the trifecta doesn't solve the problem. What attack vector remains? discuss order hn newest TeMPOraL|3 months ago None, but your product becomes about as useful and functional as a rock. kccqzy|3 months ago This is what reasonable people disagree on. My employer provides several AI coding tools, none of which can communicate with the external internet. It completely removes the exfiltration risk. And people find these tools very useful. load replies (1)
TeMPOraL|3 months ago None, but your product becomes about as useful and functional as a rock. kccqzy|3 months ago This is what reasonable people disagree on. My employer provides several AI coding tools, none of which can communicate with the external internet. It completely removes the exfiltration risk. And people find these tools very useful. load replies (1)
kccqzy|3 months ago This is what reasonable people disagree on. My employer provides several AI coding tools, none of which can communicate with the external internet. It completely removes the exfiltration risk. And people find these tools very useful. load replies (1)
TeMPOraL|3 months ago
kccqzy|3 months ago