this post was submitted on 19 Dec 2023
665 points (97.4% liked)

Technology

59106 readers
3421 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
 

Dropbox removed ability to opt your files out of AI training::undefined

you are viewing a single comment's thread
view the rest of the comments
[–] nameisnotimportant@lemmy.ml 15 points 10 months ago (2 children)

If someone has a way to poison their AI training by adding junk along my regular files I'm interested. Sadly I use it at work and I cannot decide to migrate to another cloud so I better sabotage them

[–] Natanael 6 points 10 months ago (1 children)
[–] nameisnotimportant@lemmy.ml 4 points 10 months ago (1 children)

Thank you for your contribution, I was referring to a practical way (script, binary, ...) to achieve this not academic literature, I don't have much time to invest in this and my IT level is insufficient

[–] Natanael 2 points 10 months ago* (last edited 10 months ago)

Any specific tools will require knowledge of the system you're targeting, so I don't expect to see many public ML poisoning tools targeting anything but open source ML libraries, but adversarial sample tools to fool classifiers (including repainting stuff like those face transformation filters) might get more common because it's much much easier to test

[–] 31337@sh.itjust.works 2 points 10 months ago

Create a lot of text files filled with offensive and false information. Maybe 4chan and OANN transcripts :)

It will always be a cat-and-mouse game. Once the trainers recognize the attack, they can use the attack to further improve their models. A long time ago I watched a speech from a guy who worked on Yahoo! Mail's spam detection. They realized spammers would create email accounts, send spam to them, then have the accounts mark their spam as "not spam." They came up with a method to automatically identify these accounts, and used them to further improve their spam detection model (if these accounts marked something as "not spam" it was likely spam).