top | item 46056206

(no title)

winternewt | 3 months ago

You're not explaining why the trifecta doesn't solve the problem. What attack vector remains?

discuss

order

TeMPOraL|3 months ago

None, but your product becomes about as useful and functional as a rock.

kccqzy|3 months ago

This is what reasonable people disagree on. My employer provides several AI coding tools, none of which can communicate with the external internet. It completely removes the exfiltration risk. And people find these tools very useful.