Skip to main content

It's possible. That hackers can bypass the generative AI's security.



When man meets AI, the man is more intelligent. That means that the creative AI is not creative at all. The man who uses the AI is creative. The thing that we should understand is this: what we see as an example of "fuzzy logic" is a large number of precise reactions or precise logical points. 

That means that there are multiple words. Or otherways saying:  multiple triggers. That is connected with a certain operation. This allows users to use dialect words or literally while using the AI.  

The dialect words and literary words are both connected to certain operatios. That gives the user freedom in the form of language. What the person uses to command the system. 

In this model, users can use both, dialects and literary words. That makes the AI more flexible than if the user must use precise literal words. 

We can say many ways something that launches the action. The words, connected with certain operations are called logical points. Developers can connect each action with multiple logic points. Which makes the system seem like it uses fuzzy logic. 

That means that when we give a code or order encoded into hex-decimal or ASCII mode is not precise same as the orders that we write in regular text mode. This is the thing that might bypass the protection of generative AI. If somebody wants to use the generative AI as the tool, that makes it possible to write malicious code very effectively the person must just bypass the safety mechanisms of those generative AI. One version can be that the commands are given in the form of Hex or ASCII mode. 

Another thing that can cause the ability to bypass the security of artificial intelligence is to give orders as small pieces. The hacker- or otherwise the malware developer can use multiple AIs to create the code. And then that person can connect the results. The problem is this. The code writer must have deep knowledge of coding. And the other thing is this. Hackers can use AI to develop the base code as legal developers. 

They can freely use AI to develop legal software like chat programs and firewall software. The spyware that hackers use to steal information is the chat program or firewall that is modified to send data without the user's permission. So hackers can make legal applications, and then change the code so that it runs backward and steals information. One version is to create a tool that allows as an example teachers to follow what students do with computers. 

Normally those programs tell the user. That they are operating. Their use is limited to classrooms while teachers teach things like programming.  There can be some red frames and text. That tells the observation program is in use. Or the program requires user acceptance. Hackers can remove those manifests and then they can observe the targeted computers. 


https://cybersecuritynews.com/encoding-technique-jailbreaks-chatgpt-4o/

Comments

Popular posts from this blog

What is the difference between TR-3A and TR-3B? And are those planes real?

What is the difference between TR-3A and TR-3B? And are those planes real? Is TR-3B (0) "Black Triangle UFO" or is it only the piece of paper?  The study project, what is used to create advanced ideas for use of the nuclear-powered aircraft. Or is it the study project or black budget aircraft, where lost 2,3 trillion dollars (1)of the stealth bomber were gone. In this text is things, that might seem very difficult to accept, and when we are thinking about things like doubling the object or making it smaller by using huge layers of energy, nothing denies to test those things. But were those tests successful, there is no data about that in public Internet, so we must say that things like doubling the human or aircraft can be tested, but the results can be unknown.  But in the source two is the tale, what seems like impossible, those men, who got Noble Prize put at first time one atom to the box, and hit it with photon one photon in the box and hit it with th

Nanoparticles are excellent tools for medicine transporters.

"Researchers have developed a new therapy for pancreatic cancer involving nanoparticles that stimulate immune responses and improve drug delivery. This innovative method has led to significant tumor reduction in mice and holds potential for treating other cancers. Credit: SciTechDaily.com" (ScitechDaily, New Nanoparticle Cancer Treatment Successfully Shrinks and Eliminates Pancreatic Tumors) Nanoparticles can carry medicines into wanted cells. The idea is that the same system that feeds those cells transports those nanoparticles into cells that need medicine. When a nanoparticle goes, into a cell, it releases the chemicals into the targeted cells. Because nanoparticles don't let medical molecules interact with a body that makes it possible to create new and more powerful cytostatics. Nanoparticles can transport things like ricin molecules into wanted cells.  Ricin is one of the most poisonous chemicals. That chemical is useful for next-generation cytostatics, if researche

Mythic Planet X is an interesting thing because that allows the way to the perfect stealth technology.

  Mythic Planet X is an interesting thing because that allows the way to the perfect stealth technology.  Could a hypothetical Planet X tunnel all radiation?  The myth of Planet X still lives. Nobody ever saw that planet, and the thing that supports the theory of previously unknown large-size planets in Kuiper's belt are mysterious anomalies in Neptune's trajectory. The thing is that nothing else supports the theory of the existence of the "invisible planet". The size of the planet must be very big. And its gravitational field strong that it can affect Neptune's trajectory.  And the search for that mysterious planet is very long work. In some visions, the mysterious gravitational source is mentioned as the small black hole, but nobody understands why that black hole doesn't seem to interact.  In some other theories, Planet X is a glimpse of dark matter. And that thing makes it invisible. But there is one weakness. The dark matter object must have some kind of