Comment on A group of R1 jailbreakers found a massive security flaw in Rabbit’s code
ReveredOxygen@sh.itjust.works 4 months agoI would imagine that the devices aren’t making elevenlabs requests directly, but just making requests to the rabbit backend, which forwards the responses. if I’m wrong, then that’s quite impressively bad security
LainTrain@lemmy.dbzer0.com 4 months ago
Then wouldn’t it be just one API key to the rabbit backend? Or are you suggesting every device has the same key to Elvenlabs that it sends over to the rabbit backend?
ReveredOxygen@sh.itjust.works 4 months ago
My understanding was that they leaked the key that the rabbit backend uses to make requests to elevenlabs, and were just too lazy to change it. I could easily be wrong though
LainTrain@lemmy.dbzer0.com 4 months ago
I don’t think that’s the case, because otherwise how did they leak this key that the backend uses, that presumably stayed in the backend, by reverse-engineering the rabbit android application?
I think the devices all just have hardcoded keys to the APIs themselves.