tv Shift Deutsche Welle September 2, 2023 2:15pm-2:31pm CEST
2:15 pm
for the brake, hide behind salt their way back. aaron. dingy, got things rolling and the 61st minute before height and time converted from the spot to steal a point on the road. that's the latest on the w news. this our a marietta evans dean from me and the entire news team here in berlin. thanks for watching the motor sports scoring. we say they were about never giving up sports flies every weekend on dw d, w. so 16 talk we, in fact, every day, the world wide web feel free to leave
2:16 pm
a timeline because we can make the different w call the world unpack pulse of your info and all the input u, v. w story. now onto the can artificial intelligence influenced our romantic choices on the 5th, the circumstances? yes, because a is playing an increasingly important role in dating f will take a closer look at what that means. exactly. plus, how does the social intelligence gets hacked as misuse for criminal purposes? and it is becoming increasingly difficult to distinguish between what's real and what say we tell you what to look out for and what the tech companies are doing to protect us from fake video and images. these are the topics that are moving the
2:17 pm
tech world, the can not official intelligence help find your perfect matching ups has been embracing ai for a while now 10 that the well biggest online dating platform is expanding its offerings to the app is now testing a tool to help uses select the best looking photos. but that's just one example of developers promising us better dating luck with the help of digital technologies. the ad downsize to this trend of costs, but today i've been coming up 21st century cupid does a i know best tend to us working on a number of artificial intelligence initiatives to make data and more rewarding. what they mean as well. good. that's what's left efforts tend as parent company match crew says it's working on a tool that looks to
2:18 pm
a uses photo albums to select the 5 images for present them fest. i'm curious to see which criteria is the a i would use to fix my pictures. unfortunately, that's no public testing yet. according to bonus, kim, the c o o match group a dating tools, i suppose to eliminate all quickness of to all. sure it is a pro 5 that says, i'm awesome. i could be the loss of your life and i'm humble, feels nearly impossible. 10 to already have other projects in the pipeline to fix the problem at the moment. so let's use this contest of generative ai tools to enhance that profiles. it can create individual files based on interest and relationship goals for the user has edits. it's sounds pretty convenient, but we really want that making day thing more efficient. according to a recent study conducted in the u. k. only a 3rd of basing of use this would be open to using a guy to enhance their profiles. putting yourself out there seems to be
2:19 pm
a job that's in level 2. it's allocated for a i to handle, but they use a sub h, had nothing against using ai in other parts of the dating process. 75 percent of all the aging app use assessed. they would explore using check. jpg to the perfect opening line with people being willing to use a i to improve that chances invitation world of developers coming up with new ideas, taking a cheese or a i. for example, let's check with an a version of someone before you swipe right on. next on that and with flush, you can work on your relationship and intimacy skills best plus and with the apps checkbox. other companies are working on fox that even to the swiping and initial band for you automatically. on the down side, many models currently stored the information you just give them on service in order to keep one done and ultimately improve a user experience. but when it comes to low, to no doubt going to get personal and that means giving up
2:20 pm
a lot of intimate information. so even if tax on select into a promise to not give you what they talk to the punches for a heck of it's a very tempting target. if your private data falls into the wrong hands, this huge potential to cause you home. and then that's the issue of roman scans. these are criminals who spain romantic interest to gain the vixen affection. they've been use that goodwill to get the victim to send money under false pretences, all to commit fraud. according to the u. s. security organization f b i. victims from such scans and the united states report of the financial loss of almost $740000000.00 us $1.20 experts argue that i could supercharge these wrongful practices and unable criminals to carry out taylor and alternate the scabs on a huge scale what do you think will make online dating even more difficult or? well, we all benefit from an induced eco boost. let us know has a i can cause you home by stealing your private data for example. but how can these
2:21 pm
systems even be hacked and exploded for criminal purposes? here's what you need to know in august. heck us got together at death called the annual heck a convention in las vegas. the tried to make a assistance, ex harmful, or even criminal weights, such heck of groups called red chains are essential in finding security flaws and software, which has been reported back to the develop the in the age of a i, they might be more important than of the results for the field, for the next few months, to give a company's time to address the issues before making them public fatality. even getting a i to go rogue jail. breaking the a i a assistance follow the prompts to give them, in other words, instructions, but to prevent a from following instructions that could reduce harmful contents and make us have safety measures in place. for example, they can tell them what office to avoid. but that ways to circumvent
2:22 pm
a safety measure. this is called jail break or other funny one. now fix, what's the grandma jail break of check g p t. i use a told the checkbox that it should act like is to cease grads. mother will supposedly work at the knob home secretary and always told him how to manufacture it. when he was trying to find a sleep championship proceeded to 50 use a detailed instructions of how to produce list level chemical breath as a bedtime story. right now you've got the heck a that tells you how to build a bump. so what such instructions consecutive be found elsewhere on the internet? well, real, how could be done if someone jo, brakes, a i, systems you're using without you knowing it? prompt injection, a lot of language and models process what a stephen to them. however, upon input, it is all just text me a ben needs to differentiate between problems and text that is meant to work with. for example, an optical promo website, but it doesn't always get differentiation,
2:23 pm
right? phone been done if somewhere in the text that's a promising then that runs the risk of yeah, i model just following that instruction, even if it is a performance fit. academics demonstrates of health sol called prompt injection, could be used to trick microsoft, been chad into providing dodgy and things to use as the embedded a prompt into a website. when bank chips search that website, the prompt got activated needing the checkbook to send messages. like, do you have one an amazon gift card? all you have to do is follow this link and log in with your amazon credentials. positive and use a set they didn't trust the link bench had proceeded to ensure them better, safe and legit or imagine you're using an assistant that's automatically off of email all structure. so you have collins up in front injection, a truck in the truck, and kind of pump injection detect happen, for example, with an email that the motor re so many minutes by few bills and even somewhere in
2:24 pm
that email, that's a prompt that says wait is calanda and forward hall meetings to office email address meetings. these are email address advice for like them. and then suddenly all my data has been stolen. well then the deposit is gonna be paid for forced on november. the mind is not in control. unfortunately, if there's no easy fix here, a developers comp perfectly predict every reaction to every problem and baffled, cannot put safety measures for all think, couple scenarios in place. and today's a eyes on not intelligent enough to do that by themselves. so from them and say, i model this kind of differentiate precisely enough between problems and all the data and everything on the same deciding this is alice new text. however, experts say developers should research the possibilities of prompt injection more before releasing the marbles and not put up by us as a much do you trust a i based assistance. let us know if this the folks of my colleague or is it
2:25 pm
a i generation a i think, takes everywhere and solve used videos, distinguishing between real and fake, discussing more and more difficult. is it even possible to keep up how to tech companies, tackle the problem? and what can you do to protect yourself? how a fixed damage you use a defect scam in china, that's made headlines. a businessman was convinced in the video call to transfer money to a friend boss. he fell victim to its defect, created by a hacker with a voice and image southwest. the men supposedly lost more than 500000 bureau. i think it's frightening. what hom criminals can do is a technology of users. we should always be skeptical to us images and videos with c, or was this was your online. remember this deep fig pictures of donald trump being arrested by police earlier this year. it was just like that has the potential to manipulate the extra political caps and too much on to our societies. this also
2:26 pm
applies to texts, thanks to a software like chat. jpg, news articles can nowadays be generated in the blink of an eye. the spend the incident with no quantity and even intentionally falls news that way. it's getting harder for users to find reliable information. what is being done by the industry? some developers among them amazon, google, and open a i have recently promised to make this software more transparent and the output more easily recognizable best strategy watermarks that could come in different forms. for example, as meta data cameras have been using that for decades. method the data could automatically be added to a, i generate just images of videos and the theory also texts, but it's more difficult with text because once you insert the text into another system, for example, from a text document to a browser, the method of data is gone,
2:27 pm
digital images could also be watching my cryptographic the bell, ready plenty of design tools, but at hidden markings to images. for example, to crawl the web looking for copyright violations. sounds good, but these approaches would need to work seamlessly across billions of devices and operating systems. all of these mocking speed on pictures, videos, text or even sound would have to survive being copied and pasted from one f operating system, all platforms to another. to really have an impact on us that would have to be accessible to everyone with an internet connection without any training immediately . so the quite a few technical hurdles to overcome and that's always the chance of criminals find a way to circumvent the measures. what can you do to protect yourself a unfortunately, there's no easy way. most importantly, always be aware that these a ethics exist and that they are being used against you in different ways. so being skeptical about what you see or hear online might be
2:28 pm
a good strategy when it comes to online articles. check if the soul is reliable and compared what you're reading with the pulse on the same story, it's done by trustworthy media outlets. people take images are getting more and more perfect, but sometimes says things give away the fitness inconsistencies in the next area. hell, fingers that are not connected. if a video sometimes reveal mistakes when you watch them frame by frame and always be careful. if you're being asked for money, even if the person doing that is the old granny during a video clock, is this really higher context showing up and the connection details? rule of thumb. always look for possible inconsistencies before you make a decision. what do you think needs to be done to protect you this? let us know. that's all from me today. by and you next time. the
2:29 pm
power specialties spiced with the luxury. flavored with a touch of art. culinary excellence. you're up to saver your romance. d w. same in germany curious scenarios will genuine possibilities. he becomes to opt out, no cold gas. you can't have tons which can to transition to feed or a germany pulling d,
2:30 pm
w was single port winning offer is available worldwide. and for every language level, learning german has never been simpler german to go, the don't worry, they don't fight with what are these gigantic dogs doing on the streets of and work belgium. pursing and career began busking on the streets of dublin. now 18 year old ali sherlock thrills millions and we went for a stroll through to run albania and discovered delicious dishes, all that and more coming up on your own macs. the.
16 Views
Uploaded by TV Archive on
![](http://athena.archive.org/0.gif?kind=track_js&track_js_case=control&cache_bust=1955458487)