phiresky@lemmy.world to Programmer Humor@lemmy.ml · 2 years agoHacking in 1980 vs Hacking in 2024lemmy.worldimagemessage-square12fedilinkarrow-up130
arrow-up130imageHacking in 1980 vs Hacking in 2024lemmy.worldphiresky@lemmy.world to Programmer Humor@lemmy.ml · 2 years agomessage-square12fedilink
minus-squareresidentmarchant@lemmy.worldlinkfedilinkEnglisharrow-up7·2 years agoThere’s no way the model has access to that information, though. Google’s important product must have proper scoped secret management, not just environment variables or similar.
minus-squarenomecks@lemmy.worldlinkfedilinkarrow-up2·2 years agoThere’s no root login. It’s all containers.
minus-squareSpaceNoodle@lemmy.worldlinkfedilinkarrow-up1·2 years agoIt’s containers all the way down!
There’s no way the model has access to that information, though.
Google’s important product must have proper scoped secret management, not just environment variables or similar.
There’s no root login. It’s all containers.
It’s containers all the way down!
All the way down.