| ▲ | jFriedensreich 3 days ago | ||||||||||||||||
Can you explain what you mean? How is Chesterton's fence applied to AI security helpful here? Are you just talking about not removing the "Non-AI" security architecture of the software itself? I think no one ever proposed that? | |||||||||||||||||
| ▲ | ArcHound 3 days ago | parent [-] | ||||||||||||||||
Right, what got me going is the reduction of plenty cyber security concepts into a simple "safe" label in the diagram. So what I meant is that before you discard all of the current security practices, it's better to learn about the current approach. From another angle, maybe the diagram could be fixed with changing "safe" to "danger" and "danger" to "OMG stop". But that also discards the business perspective and the nature of the protected asset. I am also happy to see the edit in the article, props to the author for that! And to address the last question, no one proposed that right now, yes. But I was in plenty of discussions about security approaches. And let me tell you, sometimes it only takes one sentence that the leadership likes to hear to detail the whole approach (especially if it results in cost savings). So I might be extra sensitive to such ideas and I try to uproot them before they bloom fully. | |||||||||||||||||
| |||||||||||||||||