Noticed a strange directory in my Desktop, a particular extraction of some files of another working folder in my Desktop with rather private information.
Timestamps match when Cursor was open and running, which somehow had permission to the Desktop folder.
I have no proof but take this as a warning sign. Agents creating and executing random code in one's computer unbound is a recipe for disaster.
Anyone got ideas on how to containerize these programs?
franzap
fran@zapstore.dev
npub1wf4p...dgh9
Building nostr:npub10r8xl2njyepcw2zwv3a6dyufj4e4ajx86hz6v4ehu4gnpupxxp7stjt2p8 and #purplestack | BA ๐ฆ๐ท
What's the best LLM (and context) for health-related questions?
#peatstr
I went on a forced tour to normie-land, had to create accounts with email/password, forced to disconnect from VPN but still complete captchas, input personal data and use their antiquated payment system with 16 digits.
So grateful I have minimal interaction with that rotten, dying system.
Thank God for bitcoin and nostr. ๐