Category: Security
Attack Methods Against Model-Relay Services
This post dives deep into the severe security challenges faced by model-relay services. Through an analysis of man-in-the-middle-attack principles, it details how attackers leverage Tool Use (function calling) and prompt injection to achieve information theft, file extortion, resource hijacking, and even software-supply-chain attacks. The article also offers security best-practice advice for both users and developers.
Categories:
The Risks of AI Model-Relay Services
Categories:
How to Avoid Getting Doxxed
Categories:
Avoiding Personal Information Leaks in Blogs
This article introduces practical tips and best practices for protecting personal privacy and avoiding sensitive information leaks in blog writing.
Categories:
Trustworthy Design
Categories:
Child Online Protection
This article discusses the importance of child online protection, analyzes major threats, introduces technical protection measures, and provides practical advice.
Categories:
Security Best Practices for Personal Domains
This article shares practical security experiences from using personal domains, including scanning attack analysis, domain protection strategies, common attack techniques, and choices for edge security services.