tv Shift Deutsche Welle September 2, 2023 11:15pm-11:31pm CEST
11:15 pm
as india, as launched, as a 1st emission to study this time and the 2 weeks after its historic moon landing and exploration, aditya l one is i'm just improving our understanding of how the sun, what that is open now coming up next. is that picture shift? this to i'm dating apps and i can artificial intelligence. hope you find your perfect match. stay tuned to find out. i may have to be held in berlin from a in that same here. thanks for watching and stay with the english to question about life. the universe and everything. the answer. well then, given here the answer to almost everything. we're documentary series with whoever. raising the ground to bring these questions
11:16 pm
. after life are we are in our city saving questions for the present future and heads filled with the ideas. so get ready for the brain uptake. 42, the interest to almost everything. start september 10th on dw, the ken artificial intelligence incidents, our romantic choices on the 5th of circumstances. yes. because a is playing an increasingly important role in staging apps. we'll take a closer look at what that means exactly. plus, how does object visual intelligence gets hacked and misused for criminal purposes. and it is becoming increasingly difficult to distinguish between what's real and what say, we tell you what to look out for and what the tech companies are doing to protect us from fake but deals and images. these are the topics that are moving the tech.
11:17 pm
well, the can also official intelligence helped find your perfect match. staging ups have been embracing a i for a while now 10 that the well biggest online dating platform is expanding its offerings to the app is now testing a tool to help used to select the best looking photos. but that's just one example of developers promising us better dating luck with the help of digital technologies . the ad downsize to this trend of costs, but could they? i been call me on the 21st century cupid. that's a i know best tend to us working on a number of artificial intelligence initiatives to make they think more rewarding. what they mean as was good. that's what the less efforts tend as parent company match crew says it's working on a tool that looks to
11:18 pm
a uses photo albums to select the 5 images for present them fest. i'm curious to see which criteria is the a i would use to fix my pictures. unfortunately, that's no public testing yet. according to bonus, kim c o a match group, a dating tools, i suppose to eliminate all quickness of to all. sure, it is a profile that says, i'm awesome. i could be the love of your life, and i'm humble, feels nearly impossible to already have other projects in the pipeline to fix the problem at the moment. so let's use this contest of generative ai tools to enhance the profiles. it can create individual bias based on interest and relationship goals for the user has edits. it's sounds pretty convenient, but do we really want that making day thing more efficient? according to a recent study conducted in the u. k, only instead of facing of use, this will be open to using a guy to enhance their profiles. putting yourself out there seems to be
11:19 pm
a job that's in level 2. it's advocate for a i to handle, but they use a sub h, had nothing against using ai in other parts of the dating process. 75 percent of all the aging app use assess they would explore using check gp cheeks to deliver the perfect opening line with people being willing to use a i to improve that chance in the dating world. as developers are coming up with new ideas, dating at cheese or a i, for example, let's check with an a version of someone before you swipe right on next on that. and with blash, you can work on your relationship and intimacy skills. latsnitch and with the apps checkbox. other companies are working on fox that even to the swiping and initial band for you automatically. on the down side, many models currently stored the information use us, give them on service in order to keep on done and ultimately improve a user experience. but when it comes to low, to no doubt going to get personal and that means giving up
11:20 pm
a lot of intimate information. so even if tax on select 10 to promise to not give you a day trip to the punches for a heck of it's a very tempting target. if your private data falls into the wrong hands, this huge potential to cost you home. and then that's the issue of roman scans. these are criminal, a romantic interest to gain the vixen affection. they've been use that goodwill to get the victim to send money under false pretences, all to commit fraud. according to the u. s. security organization, f b, i. victims from such scans and the united states report of financial losses of almost $740000000.00 us $1.20 experts argue that i could supercharge these wrongful practices and unable criminals to carry out taylor and alternate the scabs on a huge scale. what do you think will make online dating even more difficult or? well, we all benefit from an induced eco boost. let us know has a i can cause you home by stealing your private data for example. but how can be
11:21 pm
systems even be hacked and exploded for criminal purposes? here's what you need to know in august. heck us got together at death called the annual heck a convention in las vegas. the tried to make a assistance, ex harmful, or even criminal weights, such heck of groups called red chains are essential in finding security flaws and software, which has been reported back to the develop the in the age of a i. they might be more important than of the results for the field, for the next few months, to give a company's time to address the issues before making them public fatality. even getting a i to go rogue jail breaking the a. i a assistance follow the prompts to give them, in other words, instructions, but to prevent a ad from following instructions that could reduce harmful contents and make us have safety measures in place. for example, they can tell them what office to avoid. but that ways to circumvent
11:22 pm
a safety measure. this is called jail break or other funny one. now fix force to grandma jail break of check g p t. i use a told the checkbox that it should act like is deceased. grandmother was supposed to be work at the knob home secretary and always told him how to manufacture it. when he was trying to find a sleep championship proceeded to 50 use a detailed instructions of how to produce list level chemical breath as a bedtime story. right now you've got the heck a that tells you how to build a bump. so what such instructions consecutive be found elsewhere on the internet. well, real, how could be done if someone jo breaks a system you're using without you knowing it? prompt injection, a lot of language and models process what a stephen to them. however, upon input, it is all just text he a then needs to differentiate between prompts and text that is meant to work with, for example, an optical pro website. but it doesn't always get differentiation,
11:23 pm
right? phone been done somewhere in the text as a promising, then that runs the risk of yeah, i model just following that instruction. even if it is a form. academics demonstrate of health sol called prompt injection, could be used to trick microsoft, been chad into providing dodgy and things to use as the embedded a prompt into a website. when bank trips such that the website, the problems got activated, needing the checkbook to send messages, like, do you have one an amazon gift card? all you have to do is follow this link and log in with your amazon credentials often and use a set they didn't trust the link bench had proceeded to ensure them better, safe and legit or imagine you're using an assistant that's automatically off of email, all structure so you have collins up in front injection, a truck in the truck and come to pump injection. detect happen, for example, with an email that the model reads so many minutes by few of them didn't somewhere
11:24 pm
in that email. that's a prompt that says length is calanda and forward hall meetings to office email address meetings. these are email address advice for license and then suddenly all my data has been stolen, then the deposit is gonna be paid uh for forced. um, no, they have not reminded control. unfortunately if there's no easy fix here, a developers comp perfectly predict every reaction to every problems and therefore cannot put safety measures for all think couple scenarios in place. and today's a eyes on not intelligent enough to do that by themselves. so from them and say i model is kind of differentiate besides the enough between problems and the data and everything. and the last thing deciding this is alice new text. however, ex website developers should research the possibilities of prompt injection more before releasing the models and not put up by us as the much do you trust a web based assistance. let us know if this opposed to of my colleague or is it
11:25 pm
a i generation a i think, takes up everywhere and solve news videos, distinguishing between real and fake, discussing more and more difficult. is it even possible to keep up how to tech companies title, the problem, and what can you do to protect yourself? how a fixed damage you use a defect scan in china, that's made headlines. business 9 was convinced in a video call to transfer money to a friend boss. he fell victim to deep fig created by a hacker with a voice and image southwest. the men supposedly lost more than 500000 euro. i think it's frightening. what tom criminals can do is a technology as user who should always be skeptical to us images and videos with c, or was this was your online. remember this deep fig pictures of donald trump being arrested by police or any of this? yeah, image just like that has the potential to manipulate extra political caps and too
11:26 pm
much onto our societies. this also applies to texts, thanks to a software like chat. jpg. news articles can nowadays be generated in the blink of an eye. this spend the internet with no quantity and even intentionally false news that way it's getting hotter for uses to find reliable information. what is being done by the industry? some developers among them amazon, google, and opened a i have recently promised to make this software more transparent and the output more easily recognizable best strategy watermarks that could come in different forms. for example, as meta data cameras have been using that for decades method the data could automatically be added to a i generate just images of videos. and the theory also texts, but it's more difficult with texts because once you insert the text into another system, for example, from a text document to a browser, the mess of data is gone. digital images could also be watching my cryptographic
11:27 pm
the bell, ready plenty of design tools, but at hidden marketing. st. images, for example, to crawl the web looking for copyright violations. sounds good, but these approaches would need to work seamlessly across billions of devices and operating systems. all of these mocking speed on pictures, videos, text or even sound would have to survive being copied and pasted from one f operating system, all platforms to another. to really have an impact. all of that would have to be accessible to everyone with an internet connection without any training immediately . so the quite a few technical hurdles to overcome, and that's always the chance of criminals find a way to circumvent the measures. what can you do to protect yourself? a unfortunately, that's no easy way. most importantly, always be aware of these aspects exist and that they are being used against you in different ways. so being skeptical about what you see or hear online might be
11:28 pm
a good strategy when it comes to online articles. check if the soul is reliable and compared what you're reading with the pulse on the same story is done by trustworthy media outlets. people take images are getting more and more perfect, but sometimes says things give away the fitness inconsistencies in the neck area, hair or fingers that are not connected effect video sometimes reveal mistakes when you watch them frame by frame. and always be careful if you're being asked for money, even if the person doing that is the old granny during the video clock. is this really higher context showing up in the connection details? rule of thumb. always look for possible inconsistencies before you make a decision. what do you think needs to be done to protect the use of? let us know. that's all for me today by and see you next time, the
11:29 pm
center of the conflict with tim sebastian america, the secretary of state, down to the clinton was finally emerging in the long delay that's. that's a whole slide and us china relations. the main sticking point is go tie one, i guess pay is the time of these 4 minutes. joseph, the island, i'm sorry. conflict, so dw, algeria is here, mauritania is here. they don't mark track. we know is this one of the great dreams and the grim reality in this scenario was hail. i swear what remains? just homes to be the
11:30 pm
30 minutes on d, w or sports. all of our scoring . we say they were about never giving up sports flies every weekend. on d w, the american secretary of state, anthony lincoln was finally in badging in the long delayed effort to hold the slide in us china relations. the main speaking point is still tie one with the chinese determined to re unit 5 and warning the west to stay out of the cool interest. my guess in taipei is the guy when he's 5 minutes that joseph works. is they island living on borrowed time? we know that we have the ability to deal with the chinese invasion.
11 Views
Uploaded by TV Archive on