Event JSON
{
"id": "027e6d3ac38fd98c138361d4df0ea7e2f93d6a61910d41629af424adff193e26",
"pubkey": "714455902b720bef30ac3e01fbf66d7b0ae62a55920e277ff234d073639157ca",
"created_at": 1775768678,
"kind": 1,
"tags": [
[
"imeta",
"url https://files.mastodon.online/media_attachments/files/116/376/776/063/901/924/original/a0a0fb89beb1c41b.jpeg",
"m image/jpeg"
],
[
"proxy",
"https://mastodon.online/@9to5Mac/116376776126994641",
"web"
],
[
"proxy",
"https://mastodon.online/users/9to5Mac/statuses/116376776126994641",
"activitypub"
],
[
"L",
"pink.momostr"
],
[
"l",
"pink.momostr.activitypub:https://mastodon.online/users/9to5Mac/statuses/116376776126994641",
"pink.momostr"
],
[
"-"
]
],
"content": "Researchers detail how a prompt injection attack bypassed Apple Intelligence protections https://9to5mac.com/2026/04/09/researchers-detail-how-a-prompt-injection-attack-bypassed-apple-intelligence-protections/?utm_source=dlvr.it\u0026utm_medium=mastodon\nhttps://files.mastodon.online/media_attachments/files/116/376/776/063/901/924/original/a0a0fb89beb1c41b.jpeg\n",
"sig": "7502d57761d5ca7b588b36487dc984c771b1104e699f9145163eb7fe97a4226b7d05581c21362cc8d2b3cb7623bfc010116ca68825820fc61937f249a6955be0"
}