• Possibly linux@lemmy.zip
    link
    fedilink
    English
    arrow-up
    0
    arrow-down
    2
    ·
    11 days ago

    This isn’t entirely true. AI is usually trained on public data such as Wikipedia.

    AI is a tool. How you use it is what matters.

    • 31337@sh.itjust.works
      link
      fedilink
      arrow-up
      2
      ·
      edit-2
      11 days ago

      It’s also trained on data people reasonably expected would be private (private github repos, Adobe creative cloud, etc). Even if it was just public data, it can still be dangerous. I.e. It could be possible to give an LLM a prompt like, “give me a list of climate activists, their addresses, and their employers” if it was trained on this data or was good at “browsing” on its own. That’s currently not possible due to the guardrails on most models, and I’m guessing they try to avoid training on personal data that’s public, but a government agency could make an LLM without these guardrails. That data could be public, but would take a person quite a bit of work to track down compared to the ease and efficiency of just asking an LLM.

    • Wave@lemmy.ml
      link
      fedilink
      English
      arrow-up
      1
      ·
      11 days ago

      OpenAI and Dall-Es lawyers would like to use your as a witness at their 87 court hearings coming up

    • Kilgore Trout@feddit.it
      link
      fedilink
      arrow-up
      1
      ·
      edit-2
      11 days ago

      Wikipedia requires attribution, which AI scrapers never give.

      It is “public” work, but under a license.

    • StaySquared@lemmy.world
      link
      fedilink
      arrow-up
      1
      ·
      11 days ago

      Like cracking passwords / encryption and injecting itself into anything and everything that connects to the internet?

        • StaySquared@lemmy.world
          link
          fedilink
          arrow-up
          0
          ·
          11 days ago

          You can train AI to crack passwords/encryption lol. You do realize, AI right at this moment is being utilized for exactly that, right? Simply put, the very first step is to eliminate it’s boundaries/guard rails, then proceed from there.

              • Elias Griffin@lemmy.world
                link
                fedilink
                English
                arrow-up
                1
                ·
                11 days ago

                Very interesting tip, preciate that.

                @PassGAN

                Instead of relying on manual password analysis, PassGAN uses a Generative Adversarial Network (GAN) to autonomously learn the distribution of real passwords from actual password leaks, and to generate high-quality password guesses. Our experiments show that this approach is very promising.