logoalt Hacker News

nwellinghofftoday at 7:34 PM0 repliesview on HN

Are these assumptions wrong? If I 1) execute the ai as a isolated user. 2) behind a white list out and in firewall 3) on a overlay file mount

I am pretty much good to go from a it can’t do something I don’t want it to do?