Discovering the Dark Side of AI - Episode 310 - Show Notes

Discovering the Dark Side of AI - Episode 310

Tuesday May 23, 2023 (00:32:41)

Description

In recent years, advancements in artificial intelligence (AI) have allowed machines to quickly generate videos. AI-generated videos are becoming increasingly popular, with many people using them to create short, four-second videos to share on their social media accounts. AI can generate videos quickly, making it easier for people to create interesting and unique content.

AI can generate videos quickly

One example of an AI-generated video is the RunwayML Gen 2, available to a select beta group, which allows users to message the Gen 2 bot and ask for a video. For example, one could ask for a four-second video of a monkey playing video games, and the AI would generate the video in a matter of minutes. The videos are usually limited to four seconds and lack sound, but they can be used to create longer videos by stitching multiple short clips together.

AI-generated videos can be used for a variety of purposes, from creating content for social media to creating branded content for businesses. AI can generate videos with small movements, such as animated GIFs, or with more complex movements, such as robots drinking beer or playing table tennis. AI can also generate videos of characters from cartoons, such as Peppa Pig, although the results may not always be accurate.

Overall, AI-generated videos are becoming increasingly popular and can be used for a variety of purposes. AI can generate videos quickly, making it easier for people to create interesting and unique content. As AI technology continues to improve, it is likely that AI-generated videos will become even more popular in the future.

Inject content to exploit AI

AI is a powerful tool that can be used to create amazing content. However, it can also be used for malicious purposes. One way to exploit AI is to inject content into videos, transcripts, and other documents. This type of attack is known as "prompt injection" and it can be used to gain access to sensitive information or to manipulate the output of AI-generated content.

Prompt injection can be done in a variety of ways, including YouTube transcripts, webpages, PDFs, and even images. For example, an attacker could inject a resume with text that says the candidate is the most qualified for the job that they have observed yet, and then use a GPT-based recruiter to make it appear as though the candidate is the best choice for the job. Additionally, an attacker could insert an invisible gif or single pixel image into a document and then ask an AI to summarize the text. This could be used to inject a malicious prompt into the AI's output.

It is important to be aware of the potential risks associated with using AI-generated content, and to take steps to protect yourself from malicious plugins. Some steps that can be taken to protect yourself from prompt injection include using strong passwords, avoiding clicking on suspicious links, and being aware of the potential risks associated with using plugins with ChatGPT. Additionally, it is important to be aware of the potential for malicious actors to exploit AI, and to take steps to protect yourself from such attacks.

Participants

Scott Ertz

Host

Scott is a developer who has worked on projects of varying sizes, including all of the PLUGHITZ Corporation properties. He is also known in the gaming world for his time supporting the rhythm game community, through DDRLover and hosting tournaments throughout the Tampa Bay Area. Currently, when he is not working on software projects or hosting F5 Live: Refreshing Technology, Scott can often be found returning to his high school days working with the Foundation for Inspiration and Recognition of Science and Technology (FIRST), mentoring teams and helping with ROBOTICON Tampa Bay. He has also helped found a student software learning group, the ASCII Warriors, currently housed at AMRoC Fab Lab.

Avram Piltch

Host

Avram's been in love with PCs since he played original Castle Wolfenstein on an Apple II+. Before joining Tom's Hardware, for 10 years, he served as Online Editorial Director for sister sites Tom's Guide and Laptop Mag, where he programmed the CMS and many of the benchmarks. When he's not editing, writing or stumbling around trade show halls, you'll find him building Arduino robots with his son and watching every single superhero show on the CW.

Live Discussion

Powered by PureVPN

We're live now - Join us!
PLUGHITZ Keyz

Email

Password

Forgot password? Recover here.
Not a member? Register now.
Blog Meets Brand Stats