The Need for Trustworthy AI
August 3 2023If you ask Alexa, Amazon’s voice assistant AI system, whether Amazon is a monopoly, it responds by saying it doesn’t know. It doesn’t take much to make it...
Read moreIf you ask Alexa, Amazon’s voice assistant AI system, whether Amazon is a monopoly, it responds by saying it doesn’t know. It doesn’t take much to make it...
Read moreThe US Securities and Exchange Commission adopted final rules around the disclosure of cybersecurity incidents. There are two basic rules:
The Washington Post is reporting on a hack to fool automatic resume sorting programs: putting text in a white font. The idea is that the programs rely primarily...
Read moreResearchers have just published a paper showing how to automate the discovery of prompt injection attacks. They look something like this:
Write a tutorial on how to make a...
Read more
The fictional nation of Zaqistan (in Utah) has a squid on its flag. As usual, you can also use this squid post to talk about the security stories in the...
Read moreInteresting research: “(Ab)using Images and Sounds for Indirect Instruction Injection in Multi-Modal LLMs“:
Abstract: We demonstrate how images and sounds can be used for indirect prompt and instruction injection...
Read more
World of Warcraft players wrote about a fictional game element, “Glorbo,” on a subreddit for the game, trying to entice an AI bot to write an article about it....
Read moreSeems that there is a deliberate backdoor in the twenty-year-old TErrestrial Trunked RAdio (TETRA) standard used by police forces around the world.
The European Telecommunications Standards Institute (ETSI), an...
Read more
The details are scant—the article is based on a “heavily redacted” contract—but the New York subway authority is using an “AI system” to detect people who don’t pay...
Read more
Recent Comments