this post was submitted on 15 Jul 2024
240 points (98.4% liked)

Technology

59534 readers
3168 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
 

Kevin Bankston, a Senior Advisor on AI Governance, discusses this concerning Google Gemini behavior.

you are viewing a single comment's thread
view the rest of the comments
[–] sylver_dragon@lemmy.world 39 points 4 months ago (4 children)

"The cloud" continues to be someone else's computer. If you put your data up there, it's no longer your data.

[–] Cyyy@lemmy.world 5 points 4 months ago (1 children)

except if you put it in a password encrypted archive beforehand. because then nobody has access to it.

[–] tb_@lemmy.world 1 points 4 months ago (1 children)

Ya think?

Microsoft is scanning the inside of password-protected zip files for malware https://arstechnica.com/information-technology/2023/05/microsoft-is-scanning-the-inside-of-password-protected-zip-files-for-malware/

There are probably more secure methods than a password protected zip file, but just so you know.

[–] Cyyy@lemmy.world 1 points 4 months ago (1 children)

how would they scan the inside of a password protected zip archive? the whole purpose of the password is that nobody can open it without the pw. you can may look at the zip archive self and check the checksum or maybe filenames, but not open and extract the files to check them (images etc). specially not if you maybe even use rar archives who are even more secure and you can protect even filename lists etc.

[–] tb_@lemmy.world 0 points 4 months ago

I'unno, read the article.

load more comments (2 replies)