all AI news
Quoting Julia Evans
May 25, 2023, 8:12 p.m. |
Simon Willison's Weblog simonwillison.net
In general my approach to running arbitrary untrusted code is 20% sandboxing and 80% making sure that it’s an extremely low value attack target so it’s not worth trying to break in.
Programs are terminated after 1 second of runtime, they run in a container with no network access, and the machine they’re running on has no sensitive data on it and a very small CPU.
code general julia juliaevans low machine making network running security value
More from simonwillison.net / Simon Willison's Weblog
Jobs in AI, ML, Big Data
Data Architect
@ University of Texas at Austin | Austin, TX
Data ETL Engineer
@ University of Texas at Austin | Austin, TX
Lead GNSS Data Scientist
@ Lurra Systems | Melbourne
Senior Machine Learning Engineer (MLOps)
@ Promaton | Remote, Europe
Vice President, Data Science, Marketplace
@ Xometry | North Bethesda, Maryland, Lexington, KY, Remote
Field Solutions Developer IV, Generative AI, Google Cloud
@ Google | Toronto, ON, Canada; Atlanta, GA, USA