Category: Security
Attack Methods Against Model-Relay Services
This post dives deep into the severe security challenges faced by model-relay services. Through an analysis of man-in-the-middle-attack principles, it details how attackers leverage Tool Use (function calling) and prompt injection to achieve information theft, file extortion, resource hijacking, and even software-supply-chain attacks. The article also offers security best-practice advice for both users and developers.
Categories:
The Risks of AI Model-Relay Services
Categories:
How to Avoid Getting Doxxed
Categories:
Personal Domain Security Practices: From Scan Attacks to Protection Strategies
In-depth analysis of scan attack threats faced by personal domains, sharing domain security protection strategies, including practical advice such as using VPN instead of reverse proxy and deploying edge security services, helping individual developers establish a complete domain security protection system.
Categories:
Avoiding Personal Information Leaks in Blogs
This article introduces practical tips and best practices for protecting personal privacy and avoiding sensitive information leaks in blog writing.
Categories:
Trustworthy Design
Categories:
Child Online Protection
This article discusses the importance of child online protection, analyzes major threats, introduces technical protection measures, and provides practical advice.