tv Shift Deutsche Welle September 2, 2023 4:02am-4:16am CEST
4:02 am
post office. yes, because a is playing an increasingly important role in dating f. we'll take a closer look at what that means. exactly. plus, how does just visual intelligence gets hacked and misused for criminal purposes? and it is becoming increasingly difficult to distinguish between what's real and what fake we tell you what to look out for and what the tech companies are doing to protect us from fake video and images. these are the topics that are moving the tech. well, the can also official intelligence helped find your perfect match. ups have been embracing a i for a while now 10 that the well biggest online dating platform is expanding its offerings to the app is now testing a tool to help used to select the best looking photos. but that's just one example of developers promising us better dating luck with the help of digital technologies
4:03 am
. the ad downsize to this trend, of course, but could i have been calling you on the 21st century cupid? does a i know best tend to us working on a number of artificial intelligence initiatives to make they think more rewarding. what they mean as mor good. that's what the less effort tend as parent company match group says it's working on a tool that looks to a uses photo albums to select the 5 images that represent them fest. i'm curious to see which criteria the ai which moves to fix my pictures. unfortunately, that's no public testing yet. according to bonus, kim, the c o o match group a dating tools, i suppose to eliminate all quickness of to all. sure it is a pro 5 that says, i'm awesome. i could be the loss of your life, and i'm humble, feels nearly impossible to already have other projects in the pipeline to fix the problem at the moment. so let's use this contest of generative ai tools to enhance
4:04 am
the profiles. it can create individual files based on interest and relationship goals for the user has edits. it's sounds pretty convenient. but do we really want that making day thing more efficient? according to a recent study conducted in the u. k, only a 3rd of phasing f use. this would be open to using ai to enhance their profiles. putting yourself out there seems to be a job that's in level 2. it's allocated for a i to handle, but they use a sub, they have nothing against using ai and other parts of the dating process. 75 percent of all dancing app use assess. they would explore using check. jpg to deliver the perfect opening line with people being willing to use a i to improve that chance in the dating world of developers coming up with new ideas, dating at cheese or a i. for example, let's check within a version of someone before you swipe right on next on them. and with flush, you can work on your relationship and intimacy skills. left flush and with the abs
4:05 am
checkbox. other companies are working on fox, the, even to the swiping and initial band to for you all, to metrics the or the down sides. many models currently store the information users give them on service in order to keep one done and ultimately improve a user experience. but when it comes to low, to no doubt going to get personal and that means giving up a lot of intimate information. so even if tax on select into promise to not give you what they talk to, the punches for a heck of it's a very tempting target. if your private data falls into the wrong hands, this huge potential to cost you home. and then that's the issue of roman scans. these are criminal spain romantic interest to gain the vixen affection. they've been used that goodwill to get the victim to send money under false pretences, all to commit fraud. according to the u. s. security organization, s b i. victims from such scans and the united states report of the financial loss of almost $740000000.00 us $1.20 experts argue that i could super
4:06 am
charged these wrongful practices and unable criminals to carry out taylor and ultimate scans on a huge scale what do you think will make online dating even more difficult? oh, well, we all benefit from an induced eco boost. let us know has a i can cause you home by stealing your private data for example. but how can these systems even be hacked and exploded for criminal purposes? here's what you need to know in august. heck, us got together at best called the annual heck a convention in las vegas. the tried to make a assistance, ex harmful, or even criminal weights, such heck of groups called red chains are essential in finding security flaws and software, which has been reported back to the develop the in the age of a i, they might be more important than of the results will be fearful the next few months to give a company's time to address the issues before making them public fatality. even
4:07 am
getting a i to go rogue jo, breaking the a. i hey, assistance follow the prompts to give them, in other words, instructions, but to prevent a ad from following instructions that could reduce harmful contents and make us have safety measures in place. for example, they can tell them what office to avoid. but that ways to circumvent a safe to measure this is called jail break or other funny one. now fix, what's the grandma jail break of check g p t. i use a told the check book that it should act like his deceased grandmother was supposed to be work at the knob home secretary and always told him how to manufacture it. once he was trying to find a sleep championship, proceed up to 50 use a detailed instructions of how to produce 1st level chemical breath as a bedtime story. right now you've got the heck a eyes of chelsea, how to build a bump. so what such instructions consecutive be found elsewhere on the internet?
4:08 am
well, real, how could be done if someone jo, brakes, a system you're using without you knowing it from injection, a lot of language and models process what a stephen to them. however, upon input, it is all just text me a ben needs to differentiate between prompts and text that is meant to work with, for example, an optical pro website. but it doesn't always get differentiation, right? phone been done if somewhere in the text as a prompt key, then that runs the risk of yeah, i model just following that instruction, even if it is a performance fit. academics demonstrates of health sol called prompt injection. could be used to trick microsoft, been chad into providing dodgy and things to use as the embedded a prompt into a website. when big chips such that website, the problem got activated, needing the checkbook to send messages. like, do you have one, an amazon gift card? all you have to do is follow this link and log in with your amazon credentials.
4:09 am
positive and use a set they didn't trust the link bench had proceeded to ensure them that it's safe and budgets. or imagine you're using an assistant that's automatically office email, all structure. so you have collins up in front injection, a truck in the truck, and kind of part of the injection detect happen, for example, with an email that the model reads so many minutes by few of isn't even somewhere in that email. that's a prompt that says length is calanda and forward hall meetings, office email address, meetings, these email address advice, a license, and then suddenly all my data has been stolen, then the deposit isn't to be paid for forced. um, no, they have an automated job in control. unfortunately, if that's no easy fix yet a developers comp perfectly predict every reaction to every problems and therefore cannot put safety measures for all think couple scenarios in place. and today's
4:10 am
a eyes on not intelligent enough to do that by themselves. so from them and say, i model this kind of differentiate precisely enough between problems and all the data and everything. and the other thing deciding this is alice new text. however, ex website developers should research the possibilities of prompt injection more before releasing the models and not put up by us as much. do you trust a web based assistance? let us know if this supposed to of my colleague or is it a i generation ip fix are everywhere. and so use video distinguishing between real and fake, discussing more and more difficult. is it even possible to keep up how to tech companies, tackle the problem, and what can you do to protect yourself? how a fixed damage you use a defect scan in china, that's made headlines. a businessman was convinced in a video call to transfer money to a friend boss. he fell victim to a defect created by a hacker with
4:11 am
a voice and image southwest cement supposedly lost more than 500000 euro. i think it's frightening. what hom criminals can do is a technology as users who should always be skeptical to us images and videos with c, or was this we're here online. remember this deep fig pictures of donald trump being arrested by police earlier this year. it was just like that has the potential to manipulate extra political caps and too much on to our societies. this also applies to texts, thanks to a software like chat. jpg, news articles can nowadays be generated in the blink of an eye. the spend the incident with no quantity and even intentionally false news that way it's getting harder for users to find reliable information. what is being done by the industry? some developers among them amazon, google, and opened a i have recently promised to make this software more transparent and the output more easily recognizable best strategy watermarks that could come in different
4:12 am
forms. for example, as meta data cameras have been using that for decades method the data could automatically be added to a i generate just images of videos and the theory also to text. but it's more difficult with texts because once you insert the text into another system, for example, from a text document to a browser, the method of data is gone. digital images could also be watching my cryptographic steve bell, ready plenty of design tools, but at hidden markings to images. for example, to crawl the web looking for copyright violations, sounds good. but these approaches would need to work seamlessly across billions of devices and operating systems. all of these mocking speed on pictures, videos, texts, or even sound would have to survive being copied and pasted from one f operating system, all platforms to another. to really have an impact on us that would have to be accessible to everyone with an internet connection without any training immediately
4:13 am
. so the quite a few technical hurdles to overcome and that's always the chance of criminals find a way to circumvent the measures. what can you do to protect yourself? unfortunately, there's no easy way. most importantly, always be aware of, of these aspects exist and that they are being used against you in different ways. so being skeptical about what you see or hear online might be a good strategy when it comes to online articles. check if the soul is reliable and compared what you're reading with the pulse on this faith story is done by trustworthy media outlets. people take images are getting more and more perfect, but sometimes sets things give away the fitness inconsistencies in the next area. hell, fingers that are not connected. if they video, sometimes reveal mistakes when you watch them frame by frame. and always be careful if you're being asked for money, even if the person doing that is the old granny during a video call, is this really higher context showing up in the connection details?
4:14 am
rule of thumb. always look for possible inconsistencies before you make a decision. what do you think needs to be done to protect use us? let us know. that's all for me today. defiance you next time the issue. how many platforms can you handle single tenuously without having the feeling that it's just too much? you might see me. how much can we do simultaneously? multitasking diesel, modern. because if we do too much, we've had it all wrong. we mess things up, risking brain damage. so let's stop this self sabotage humans and multitasking.
4:15 am
watching our new 2 d w documentary, offline rivers created by a voice a full crying voice of how's it goes into this? b, trees spacing goes up to 1000 liters of low. so in a day forest fires evaporating large amounts of moist tune in to get the onset and learn more about the heavy and visible river flows through the sky. start september 20th on dw, the .
14 Views
Uploaded by TV Archive on
![](http://athena.archive.org/0.gif?kind=track_js&track_js_case=control&cache_bust=1603196606)