Forwarded from LyChat
  
Порошенко в Твіттері показав свій MacBook на Windows з російським інтерфейсом
На макбуці цифри 1234, ймовірно пароль
На макбуці цифри 1234, ймовірно пароль
😁17🤣4😡1
  Для тех кто не слышал - Google с 2026 фактически запрещает установку APK не из Play Store (т. е. без валидации по паспорту)
Энжой йор 1984
Энжой йор 1984
😱13🌭3
  > Я так блять півтора місяці чекав аппрува від Apple тупо підтвердження своєї адреси
і в кінці кінців їм не підійшло
  і в кінці кінців їм не підійшло
Forwarded from LyChat
з плюсів, росіяни тепер не зможу ні на iOS ні на Android свої застосунки пихати
😁14❤6🤡3
  Forwarded from HN Best Comments
Re: Claude for Chrome
Claude for Chrome seems to be walking right into the "lethal trifecta." https://simonwillison.net/2025/Jun/16/the-lethal-trifecta/
"The lethal trifecta of capabilities is:"
• Access to your private data—one of the most common purposes of tools in the first place!
• Exposure to untrusted content—any mechanism by which text (or images) controlled by a malicious attacker could become available to your LLM
• The ability to externally communicate in a way that could be used to steal your data (I often call this “exfiltration” but I’m not confident that term is widely understood.)
If your agent combines these three features, an attacker can easily trick it into accessing your private data and sending it to that attacker.
dfabulich, 9 hours ago
  
  Claude for Chrome seems to be walking right into the "lethal trifecta." https://simonwillison.net/2025/Jun/16/the-lethal-trifecta/
"The lethal trifecta of capabilities is:"
• Access to your private data—one of the most common purposes of tools in the first place!
• Exposure to untrusted content—any mechanism by which text (or images) controlled by a malicious attacker could become available to your LLM
• The ability to externally communicate in a way that could be used to steal your data (I often call this “exfiltration” but I’m not confident that term is widely understood.)
If your agent combines these three features, an attacker can easily trick it into accessing your private data and sending it to that attacker.
dfabulich, 9 hours ago
Simon Willison’s Weblog
  
  The lethal trifecta for AI agents: private data, untrusted content, and external communication
  If you are a user of LLM systems that use tools (you can call them “AI agents” if you like) it is critically important that you understand the risk of …
👍6
  Forwarded from Tech Crimes (LucioB16 -)
This media is not supported in your browser
    VIEW IN TELEGRAM
  😁6🔥2❤1
  
  Dolboeb-driven Development
https://en.wikipedia.org/wiki/Scam_call_centers_in_Ukraine
Но вообще это русня походу добавила перевод, потому что там есть вот эта мразотная в ру-вики
🔥1
  
  Dolboeb-driven Development
Но вообще это русня походу добавила перевод, потому что там есть вот эта мразотная в ру-вики
Из обсуждения статьи:
> когда автор пишет "на Украине", он имеет ввиду велосипед, на котором сношали его мать? 87.244.141.243 22:35, 22 февраля 2025 (UTC)
> когда автор пишет "на Украине", он имеет ввиду велосипед, на котором сношали его мать? 87.244.141.243 22:35, 22 февраля 2025 (UTC)
🤣28👍1
  >but Ukraine’s legal framework presented some important safety restrictions: All AI systems involved in Ukrainian public services must operate within a closed infrastructure, with no external API calls or cloud dependencies
Джерело
Ну хоч так
  
  Джерело
Ну хоч так
Google DeepMind
  
  The Ministry of Economy, Ecology and Agriculture of Ukraine digitizes licensing process with Gemma
  Ukraine uses Gemma to build a more efficient and transparent system for government-issued licenses.
❤3