Preferences

[flagged]

Please don't cross into personal attack no matter how wrong someone is or you feel they are.

https://news.ycombinator.com/newsguidelines.html

Edit: We've had to ask you this more than once before, and you've continued to do it repeatedly (e.g. https://www.hackerneue.com/item?id=45389115, https://www.hackerneue.com/item?id=45282435). If you don't fix this, we're going to end up banning you, so it would be good if you'd please review the site guidelines and stick to them from now on.

Amazing work, dang. Is there a way to report a comment to the mods? Or the flag feature does that already?
Flagging, plus in egregious cases you can email us at hn@ycombinator.com.
So tell us how to safely run this stuff then.

I was under the impression that Docker container escapes are actually very rare. How high do you rate the chance of a prompt injection attack against Claude running in a docker container on macOS managing to break out of that container?

(Actually hang on, you called me out for suggesting containers like Docker are safe but that's not what I said - I said "a safe container" - which is a perfectly responsible statement to make: if you know how to run them in a "safe container" you should do so. Firecracker or any container not running on your own hardware would count there.)

I'll also point out that I've been writing about security topics for 22 years. https://simonwillison.net/tags/security/
> So tell us how to safely run this stuff then.

That's the secret, cap... you can't. And it's due to in band signalling, something I've mentioned on numerous occasions. People should entertain the idea that we're going to have to reeducated people about what is and isn't possible because the AI world has been playing make believe so much they can't see the fundamental problems to which there is no solution.

https://en.m.wikipedia.org/wiki/In-band_signaling

Seems pretty glib. Be more specific about what "can't" be done? The preceding argument was about the inadequacy of namespaced shared-kernel containers for workload isolation. But there are lots of ways to isolate workloads.

This item has no comments currently.

Keyboard Shortcuts

Story Lists

j
Next story
k
Previous story
Shift+j
Last story
Shift+k
First story
o Enter
Go to story URL
c
Go to comments
u
Go to author

Navigation

Shift+t
Go to top stories
Shift+n
Go to new stories
Shift+b
Go to best stories
Shift+a
Go to Ask HN
Shift+s
Go to Show HN

Miscellaneous

?
Show this modal