Chris Heilmann & Daniel Cranney & Ramona Schwering

WeAreDevelopers LIVE - Chrome for Sale? Comet - the upcoming perplexity browser Stealing and leaking

Never trust the LLM. Treat AI-generated code like a junior developer's pull request to prevent introducing massive security vulnerabilities.

WeAreDevelopers LIVE - Chrome for Sale? Comet - the upcoming perplexity browser Stealing and leaking
#1about 3 minutes

The overlooked security risks of AI and LLMs

AI tools can introduce unintentional data exposure and security traps that developers often overlook.

#2about 8 minutes

Understanding the recent surge in software vulnerabilities

Over-trusting AI-generated code, like insecure regex patterns, contributes to a significant increase in actively exploited vulnerabilities.

#3about 5 minutes

The hidden security dangers of vibe coding

While democratizing access to code, vibe coding creates major risks through exposed API keys and a lack of understanding of underlying security principles.

#4about 7 minutes

Enhancing personal security with physical hardware keys

Physical security keys like YubiKey offer a robust hardware-based authentication method to protect critical accounts beyond traditional passwords and passkeys.

#5about 5 minutes

The growing threat of DDoS attacks and cloud monitoring

DDoS attacks are increasing dramatically, highlighting the need for services like Cloudflare and tools like Cloud Snitch to monitor and protect cloud infrastructure.

#6about 4 minutes

Navigating employee surveillance and company hardware policies

Using company hardware for personal projects can lead to intellectual property disputes, and employee surveillance tools raise significant trust and privacy issues.

#7about 3 minutes

Exploring specific web vulnerabilities and filtering issues

An examination of less common attack vectors like WebSocket hijacking and the unintended consequences of overzealous input filtering in web editors.

#8about 7 minutes

The potential sale of Chrome and its web implications

Google may be forced to sell Chrome due to monopoly concerns, raising questions about the future of the open web and user privacy under new ownership.

#9about 4 minutes

Customizing ChatGPT's verbose communication style

Users can employ specific prompts to counteract ChatGPT's overly positive and verbose "house style" for more direct and efficient interactions.

#10about 6 minutes

The authenticity problem with AI-generated content

The rise of AI-generated podcasts and social media voiceovers raises concerns about the loss of authenticity and human connection in digital media.

#11about 2 minutes

The irony of using a pirated font in anti-piracy ads

The iconic "You wouldn't steal a car" anti-piracy campaign from the DVD era was ironically created using a pirated font.

#12about 2 minutes

Final advice on security and responsible AI usage

Key takeaways include never blindly trusting LLM outputs and recognizing that implementing robust security is a necessity, not a choice.

Related jobs
Jobs that call for the skills explored in this talk.

Featured Partners

From learning to earning

Jobs that call for the skills explored in this talk.

Backend Engineer (m/w/d)

Backend Engineer (m/w/d)

fulfillmenttools
Köln, Germany

35-65K
Intermediate
TypeScript
Agile Methodologies
Google Cloud Platform