this post was submitted on 17 Jul 2023
345 points (95.5% liked)

Technology

57453 readers
4575 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
 

WormGPT Is a ChatGPT Alternative With 'No Ethical Boundaries or Limitations'::undefined

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 33 points 1 year ago (3 children)

A scary possibility with AI malware would be a virus that monitors the internet for news articles about itself and modifies its code based on that. Instead of needing to contact a command and control server for the malware author to change its behavior, each agent could independently and automatically change its strategy to evade security researchers.

[–] [email protected] 9 points 1 year ago (1 children)

to quote something I just saw earlier:

I was having a good day, we were all having a good day....

now.... no sleep. thanks

[–] [email protected] 7 points 1 year ago

If it helps you sleep, that means we could also publish fake articles that makes it rewrite its own code to produce bugs/failures

[–] Quacksalber 5 points 1 year ago

I doubt any consumer hardware is powerful enough to run a LLM undetected.

[–] [email protected] 2 points 1 year ago

The limiting factor is pre existing information. It's great at retrieving obscure information and even remixing it, but it can't really imagine totally new things. Plus white hats would also have LLMs to find vulnerabilities. I think it's easier to detect vulnerabilities based on known existing techniques than it is to invent totally new techniques.