Tagged articles
3 articles
Page 1 of 1
php Courses
php Courses
Nov 30, 2023 · Information Security

ChatGPT Repeat Prompt Vulnerability Exposes Sensitive Personal Information

Researchers discovered that prompting ChatGPT with repeated words can cause the model to leak private data such as phone numbers and email addresses, highlighting a serious repeat‑prompt vulnerability that reveals substantial personally identifiable information from its training corpus.

ChatGPTPIIarXiv
0 likes · 3 min read
ChatGPT Repeat Prompt Vulnerability Exposes Sensitive Personal Information
Meituan Technology Team
Meituan Technology Team
Sep 22, 2022 · Information Security

Tokenization for Data Security: Design, Implementation, and Engineering Practices

The article explains how tokenization transforms data security into a built‑in attribute that automatically scales with data growth, detailing its design principles, generation methods, architectural layers, security safeguards, and practical engineering experiences to address exposure risks in modern digital businesses.

Data GovernancePIISecurity Architecture
0 likes · 24 min read
Tokenization for Data Security: Design, Implementation, and Engineering Practices
GrowingIO Tech Team
GrowingIO Tech Team
Oct 22, 2021 · Information Security

Securing Enterprise Data: GrowingIO’s KMS‑Driven Runtime and PII Encryption

This article explains the definition and importance of data security, describes GrowingIO’s implementation of software runtime protection and static storage encryption using KMS, details data logic isolation, PII management with AES‑256 encryption, and provides code examples for configuring and using these security measures in cloud environments.

JavaKMSPII
0 likes · 10 min read
Securing Enterprise Data: GrowingIO’s KMS‑Driven Runtime and PII Encryption