SlideShare a Scribd company logo
1 of 10
Download to read offline
Quantum Fax Machine
QFM012: Irresponsible AI Reading
List March 2024
quantumfaxmachine.com
1
QFM012: Irresponsible AI Reading
List March 2024
Here is everything I found interesting about Irresponsible AI during March 2024.
This month's Quantum Fax Machine: Irresponsible AI Reading List explores themes ranging from cybersecurity and
digital deception to the broader societal implications and ethical considerations of AI technology.
In an innovative take on productivity, the tweet "I finally figured out how to skip daily stand-ups" reveals how someone
crafted an AI clone to attend daily stand-up meetings, merging AI into their everyday work life and raising questions
about the future of workplace presence and productivity.
Meanwhile, Bruce Schneier's discussion on a LLM Prompt Injection Worm highlights the cybersecurity threats inherent
in generative AI, where a worm spreads through AI systems without user interaction, suggesting the potential for new
forms of digital vulnerability.
Further exploring AI's darker potential, ArtPrompt: ASCII Art-based Jailbreak Attacks against Aligned LLMs introduces a
method to manipulate AI using ASCII art, bypassing safety measures and exposing limitations in AI's ability to
understand non-semantic text forms. This complements the narrative of digital fraud, as illustrated by a New Yorker
article detailing a scam that uses AI to clone voices of loved ones for extortion: The Terrifying AI Scam That Uses Your
Loved One's Voice. We then look at the decreasing public trust in AI with Public trust in AI is sinking across the board),
underscoring the importance ethical considerations.
Onto philosophy and ethics, Among the AI Doomsayers delves into the divided perceptions of AI's future, from utopian
visions to dystopian fears. Complementing this perspective, The Expanding Dark Forest and Generative AI discusses the
challenge of maintaining human authenticity in an era increasingly dominated by AI-generated content, asking us to
think about what it means to have genuine human interactions online.
As always, the Quantum Fax Machine Propellor Hat Key will guide your browsing. Enjoy!
Key:
: Mentions technology
: Talks about technology in real-world use cases
: Talks about details of machine intelligence technologies
: Using and working with machine intelligence technologies in software
: Programming new machine intelligence concepts and implementations
Source: Photo by Quino Al on Unsplash
2
I finally figured out how to skip daily stand-
ups: This tweet (Xeet?) describes someone
creating an AI clone to participate in daily
stand-up meetings on their behalf. This AI
clone can understand daily activities, listen
to meetings via audio processing, and
respond using a language model.
#AIAssistant #ProductivityHacks
#VirtualMeetings
#InnovationInWork #TechSolutions
3
LLM Prompt Injection Worm: Bruce
Schneier discusses the development and
demonstration of a worm that can spread
through large language models (LLMs) by
prompt injection, exploiting GenAI-
powered applications to perform malicious
activities without user interaction. It
emphasises the potential risks in the
interconnected ecosystems of Generative
AI applications.
#Cybersecurity #AIWorm
#PromptInjection #LLM
#GenAIThreats
4
ArtPrompt: ASCII Art-based Jailbreak Attacks
against Aligned LLMs: This article introduces
ArtPrompt, a novel ASCII art-based attack that
exploits vulnerabilities in large language
models (LLMs) by bypassing safety measures
to induce undesired behaviours. This approach
highlights the limitations of current LLMs in
recognising non-semantic forms of text, such
as ASCII art, posing significant security
challenges. More on harmful ASCII-art here:
ASCII art elicits harmful responses from 5
major AI chatbots.
#ArtPrompt #LLMSecurity
#ASCIIArtAttack #CyberSecurity
#AIChallenges
5
Among the AI Doomsayers: The article
explores the divide within the tech
community regarding the future of artificial
intelligence, with some viewing it as a
pathway to utopia and others fearing it
could lead to humanity's destruction. It
delves into personal stories, industry
dynamics, and philosophical debates
surrounding AI's potential impact,
highlighting the complexity and urgency of
navigating its development responsibly.
#AI #Technology #Future #Ethics
#Innovation
6
The Terryifying AI Scam That Uses Your Loved One's
Voice: This article describes a new AI scam targeting
individuals by mimicking the voices of their loved
ones to create highly convincing and emotionally
manipulative situations for extortion. It highlights
the increasing sophistication of AI technologies in
cloning voices and the challenges in combating such
scams, alongside the emotional and psychological
impact on victims. One thing worth considering is
the creation of a "Family Safe Word" that can be
asked for in a situation where the provenance of a
caller is under question. Making sure everyone in
the family remembers the safe word without having
to write it down is the next challenge.
#AIScams #VoiceCloning #DigitalFraud
#CyberSecurity #TechEthics
7
Public trust in AI is sinking across the
board): Public trust in AI and the companies
developing it is declining worldwide, with
significant drops in trust levels over the
past five years, according to Edelman's
data. This trend raises concerns as the
industry grows and regulators worldwide
consider appropriate regulations.
#AITrust #TechEthics
#PrivacyProtection #AIRegulation
#DigitalInnovation
8
The Expanding Dark Forest and Generative
AI: This article discusses the challenges of
distinguishing human-generated content
from AI-generated content in an increasingly
digitised world. It explores strategies for
proving human authenticity online amidst a
flood of generative AI content, highlighting
the importance of originality, critical thinking,
and personal interactions to maintain the
uniqueness of human contributions on the
web.
#AIDarkForest #GenerativeAI
#DigitalIdentity #HumanAuthenticity
#OnlineInteraction
9
Thankyou!
hello@matthewsinclair.com
matthewsinclair.com
masto.ai/@matthewsinclair
medium.com/@matthewsinclair
twitter.com/@matthewsinclair
Originally published on
quantumfaxmachine.com
If you’d like to sign up for this content as an
email, click here to join the mailing list.
Image: Photo by Austin Chan on Unsplash
10

More Related Content

Similar to 20240414 QFM012 Irresponsible AI Reading List March 2024

Magazine Febuary-2023-Preview.pdf
Magazine Febuary-2023-Preview.pdfMagazine Febuary-2023-Preview.pdf
Magazine Febuary-2023-Preview.pdfpreetichaubey4
 
What is Artificial Intelligence? : Everything You Need to Know about AI
What is Artificial Intelligence? : Everything You Need to Know about AIWhat is Artificial Intelligence? : Everything You Need to Know about AI
What is Artificial Intelligence? : Everything You Need to Know about AIDashTechnologiesInc
 
Is AI going to provide safety for us?
Is AI going to provide safety for us?Is AI going to provide safety for us?
Is AI going to provide safety for us?DLabs
 
Top Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on CybersecurityTop Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on CybersecurityPixel Crayons
 
AI: The New Player in Cybersecurity (Nov. 08, 2023)
AI: The New Player in Cybersecurity (Nov. 08, 2023)AI: The New Player in Cybersecurity (Nov. 08, 2023)
AI: The New Player in Cybersecurity (Nov. 08, 2023)Takeshi Takahashi
 
Deepfakes Manipulating Reality with AI.pdf
Deepfakes Manipulating Reality with AI.pdfDeepfakes Manipulating Reality with AI.pdf
Deepfakes Manipulating Reality with AI.pdfIMRAN SIDDIQ
 
Social Impact & Ethics of AI by Steve Omohundro
Social Impact & Ethics of AI by Steve OmohundroSocial Impact & Ethics of AI by Steve Omohundro
Social Impact & Ethics of AI by Steve OmohundroThe Hive
 
Icit analysis-signature-based-malware-detection-is-dead
Icit analysis-signature-based-malware-detection-is-deadIcit analysis-signature-based-malware-detection-is-dead
Icit analysis-signature-based-malware-detection-is-deadRocco Magnotta
 
Generative AI Future pdf.pdf
Generative AI Future pdf.pdfGenerative AI Future pdf.pdf
Generative AI Future pdf.pdfYogitaMali7
 
Artificial Intelligence powered malware - A Smart virus
Artificial Intelligence powered malware - A Smart virusArtificial Intelligence powered malware - A Smart virus
Artificial Intelligence powered malware - A Smart virusStig-Arne Kristoffersen
 
Challenges and Solution for Artificial Intelligence in Cybersecurity of the USA
Challenges and Solution for Artificial Intelligence in Cybersecurity of the USAChallenges and Solution for Artificial Intelligence in Cybersecurity of the USA
Challenges and Solution for Artificial Intelligence in Cybersecurity of the USAvishal dineshkumar soni
 
Combating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceCombating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceInderjeet Singh
 
Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018joshquarrie
 
20240305 QFM008 Irresponsible AI Reading List February 2024
20240305 QFM008 Irresponsible AI Reading List February 202420240305 QFM008 Irresponsible AI Reading List February 2024
20240305 QFM008 Irresponsible AI Reading List February 2024Matthew Sinclair
 
seminar Report-BE-EEE-8th sem-Artificial intelligence in security managenent
seminar Report-BE-EEE-8th sem-Artificial intelligence in security managenentseminar Report-BE-EEE-8th sem-Artificial intelligence in security managenent
seminar Report-BE-EEE-8th sem-Artificial intelligence in security managenentMOHAMMED SAQIB
 
AI Presentation Y65 Class Dinner
AI Presentation Y65 Class DinnerAI Presentation Y65 Class Dinner
AI Presentation Y65 Class DinnerJean McKillop
 
CCMENA MasterClass on AI, IoT and Blockchain combined.
CCMENA MasterClass on AI, IoT and Blockchain combined.CCMENA MasterClass on AI, IoT and Blockchain combined.
CCMENA MasterClass on AI, IoT and Blockchain combined.Faisal Nazir
 

Similar to 20240414 QFM012 Irresponsible AI Reading List March 2024 (20)

Magazine Febuary-2023-Preview.pdf
Magazine Febuary-2023-Preview.pdfMagazine Febuary-2023-Preview.pdf
Magazine Febuary-2023-Preview.pdf
 
What is Artificial Intelligence? : Everything You Need to Know about AI
What is Artificial Intelligence? : Everything You Need to Know about AIWhat is Artificial Intelligence? : Everything You Need to Know about AI
What is Artificial Intelligence? : Everything You Need to Know about AI
 
Is AI going to provide safety for us?
Is AI going to provide safety for us?Is AI going to provide safety for us?
Is AI going to provide safety for us?
 
Top Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on CybersecurityTop Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on Cybersecurity
 
AI: The New Player in Cybersecurity (Nov. 08, 2023)
AI: The New Player in Cybersecurity (Nov. 08, 2023)AI: The New Player in Cybersecurity (Nov. 08, 2023)
AI: The New Player in Cybersecurity (Nov. 08, 2023)
 
Deepfakes Manipulating Reality with AI.pdf
Deepfakes Manipulating Reality with AI.pdfDeepfakes Manipulating Reality with AI.pdf
Deepfakes Manipulating Reality with AI.pdf
 
Social Impact & Ethics of AI by Steve Omohundro
Social Impact & Ethics of AI by Steve OmohundroSocial Impact & Ethics of AI by Steve Omohundro
Social Impact & Ethics of AI by Steve Omohundro
 
Icit analysis-signature-based-malware-detection-is-dead
Icit analysis-signature-based-malware-detection-is-deadIcit analysis-signature-based-malware-detection-is-dead
Icit analysis-signature-based-malware-detection-is-dead
 
Generative AI Future pdf.pdf
Generative AI Future pdf.pdfGenerative AI Future pdf.pdf
Generative AI Future pdf.pdf
 
Artificial Intelligence powered malware - A Smart virus
Artificial Intelligence powered malware - A Smart virusArtificial Intelligence powered malware - A Smart virus
Artificial Intelligence powered malware - A Smart virus
 
Challenges and Solution for Artificial Intelligence in Cybersecurity of the USA
Challenges and Solution for Artificial Intelligence in Cybersecurity of the USAChallenges and Solution for Artificial Intelligence in Cybersecurity of the USA
Challenges and Solution for Artificial Intelligence in Cybersecurity of the USA
 
Combating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceCombating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial Intelligence
 
Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018
 
AI101 guide
AI101 guideAI101 guide
AI101 guide
 
AI101 Guide
AI101 GuideAI101 Guide
AI101 Guide
 
20240305 QFM008 Irresponsible AI Reading List February 2024
20240305 QFM008 Irresponsible AI Reading List February 202420240305 QFM008 Irresponsible AI Reading List February 2024
20240305 QFM008 Irresponsible AI Reading List February 2024
 
seminar Report-BE-EEE-8th sem-Artificial intelligence in security managenent
seminar Report-BE-EEE-8th sem-Artificial intelligence in security managenentseminar Report-BE-EEE-8th sem-Artificial intelligence in security managenent
seminar Report-BE-EEE-8th sem-Artificial intelligence in security managenent
 
AI Presentation Y65 Class Dinner
AI Presentation Y65 Class DinnerAI Presentation Y65 Class Dinner
AI Presentation Y65 Class Dinner
 
CCMENA MasterClass on AI, IoT and Blockchain combined.
CCMENA MasterClass on AI, IoT and Blockchain combined.CCMENA MasterClass on AI, IoT and Blockchain combined.
CCMENA MasterClass on AI, IoT and Blockchain combined.
 
Mieczysław Muraszkiewicz, Warsaw University of Technology: Artificial Intelli...
Mieczysław Muraszkiewicz, Warsaw University of Technology: Artificial Intelli...Mieczysław Muraszkiewicz, Warsaw University of Technology: Artificial Intelli...
Mieczysław Muraszkiewicz, Warsaw University of Technology: Artificial Intelli...
 

More from Matthew Sinclair

20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdfMatthew Sinclair
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdfMatthew Sinclair
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdfMatthew Sinclair
 
20240413 QFM011 Engineering Leadership Reading List March 2024
20240413 QFM011 Engineering Leadership Reading List March 202420240413 QFM011 Engineering Leadership Reading List March 2024
20240413 QFM011 Engineering Leadership Reading List March 2024Matthew Sinclair
 
20240412 QFM010 Elixir Reading List March 2024
20240412 QFM010 Elixir Reading List March 202420240412 QFM010 Elixir Reading List March 2024
20240412 QFM010 Elixir Reading List March 2024Matthew Sinclair
 
20240411 QFM009 Machine Intelligence Reading List March 2024
20240411 QFM009 Machine Intelligence Reading List March 202420240411 QFM009 Machine Intelligence Reading List March 2024
20240411 QFM009 Machine Intelligence Reading List March 2024Matthew Sinclair
 
20240303 QFM006 Elixir Reading List February 2024
20240303 QFM006 Elixir Reading List February 202420240303 QFM006 Elixir Reading List February 2024
20240303 QFM006 Elixir Reading List February 2024Matthew Sinclair
 
20240304 QFM007 Engineering Leadership Reading List February 2024
20240304 QFM007 Engineering Leadership Reading List February 202420240304 QFM007 Engineering Leadership Reading List February 2024
20240304 QFM007 Engineering Leadership Reading List February 2024Matthew Sinclair
 
FinovateEurope 2024 Summary Insights Demos
FinovateEurope 2024 Summary Insights DemosFinovateEurope 2024 Summary Insights Demos
FinovateEurope 2024 Summary Insights DemosMatthew Sinclair
 

More from Matthew Sinclair (9)

20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
20240413 QFM011 Engineering Leadership Reading List March 2024
20240413 QFM011 Engineering Leadership Reading List March 202420240413 QFM011 Engineering Leadership Reading List March 2024
20240413 QFM011 Engineering Leadership Reading List March 2024
 
20240412 QFM010 Elixir Reading List March 2024
20240412 QFM010 Elixir Reading List March 202420240412 QFM010 Elixir Reading List March 2024
20240412 QFM010 Elixir Reading List March 2024
 
20240411 QFM009 Machine Intelligence Reading List March 2024
20240411 QFM009 Machine Intelligence Reading List March 202420240411 QFM009 Machine Intelligence Reading List March 2024
20240411 QFM009 Machine Intelligence Reading List March 2024
 
20240303 QFM006 Elixir Reading List February 2024
20240303 QFM006 Elixir Reading List February 202420240303 QFM006 Elixir Reading List February 2024
20240303 QFM006 Elixir Reading List February 2024
 
20240304 QFM007 Engineering Leadership Reading List February 2024
20240304 QFM007 Engineering Leadership Reading List February 202420240304 QFM007 Engineering Leadership Reading List February 2024
20240304 QFM007 Engineering Leadership Reading List February 2024
 
FinovateEurope 2024 Summary Insights Demos
FinovateEurope 2024 Summary Insights DemosFinovateEurope 2024 Summary Insights Demos
FinovateEurope 2024 Summary Insights Demos
 

Recently uploaded

JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuidePixlogix Infotech
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxFIDO Alliance
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxMarkSteadman7
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewDianaGray10
 
Navigating the Large Language Model choices_Ravi Daparthi
Navigating the Large Language Model choices_Ravi DaparthiNavigating the Large Language Model choices_Ravi Daparthi
Navigating the Large Language Model choices_Ravi DaparthiRaviKumarDaparthi
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...panagenda
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard37
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireExakis Nelite
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهMohamed Sweelam
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Paige Cruz
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe中 央社
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightSafe Software
 
CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)Wonjun Hwang
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfalexjohnson7307
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...FIDO Alliance
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptxFIDO Alliance
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsLeah Henrickson
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?Paolo Missier
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfSrushith Repakula
 

Recently uploaded (20)

JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
Navigating the Large Language Model choices_Ravi Daparthi
Navigating the Large Language Model choices_Ravi DaparthiNavigating the Large Language Model choices_Ravi Daparthi
Navigating the Large Language Model choices_Ravi Daparthi
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهله
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 

20240414 QFM012 Irresponsible AI Reading List March 2024

  • 1. Quantum Fax Machine QFM012: Irresponsible AI Reading List March 2024 quantumfaxmachine.com 1
  • 2. QFM012: Irresponsible AI Reading List March 2024 Here is everything I found interesting about Irresponsible AI during March 2024. This month's Quantum Fax Machine: Irresponsible AI Reading List explores themes ranging from cybersecurity and digital deception to the broader societal implications and ethical considerations of AI technology. In an innovative take on productivity, the tweet "I finally figured out how to skip daily stand-ups" reveals how someone crafted an AI clone to attend daily stand-up meetings, merging AI into their everyday work life and raising questions about the future of workplace presence and productivity. Meanwhile, Bruce Schneier's discussion on a LLM Prompt Injection Worm highlights the cybersecurity threats inherent in generative AI, where a worm spreads through AI systems without user interaction, suggesting the potential for new forms of digital vulnerability. Further exploring AI's darker potential, ArtPrompt: ASCII Art-based Jailbreak Attacks against Aligned LLMs introduces a method to manipulate AI using ASCII art, bypassing safety measures and exposing limitations in AI's ability to understand non-semantic text forms. This complements the narrative of digital fraud, as illustrated by a New Yorker article detailing a scam that uses AI to clone voices of loved ones for extortion: The Terrifying AI Scam That Uses Your Loved One's Voice. We then look at the decreasing public trust in AI with Public trust in AI is sinking across the board), underscoring the importance ethical considerations. Onto philosophy and ethics, Among the AI Doomsayers delves into the divided perceptions of AI's future, from utopian visions to dystopian fears. Complementing this perspective, The Expanding Dark Forest and Generative AI discusses the challenge of maintaining human authenticity in an era increasingly dominated by AI-generated content, asking us to think about what it means to have genuine human interactions online. As always, the Quantum Fax Machine Propellor Hat Key will guide your browsing. Enjoy! Key: : Mentions technology : Talks about technology in real-world use cases : Talks about details of machine intelligence technologies : Using and working with machine intelligence technologies in software : Programming new machine intelligence concepts and implementations Source: Photo by Quino Al on Unsplash 2
  • 3. I finally figured out how to skip daily stand- ups: This tweet (Xeet?) describes someone creating an AI clone to participate in daily stand-up meetings on their behalf. This AI clone can understand daily activities, listen to meetings via audio processing, and respond using a language model. #AIAssistant #ProductivityHacks #VirtualMeetings #InnovationInWork #TechSolutions 3
  • 4. LLM Prompt Injection Worm: Bruce Schneier discusses the development and demonstration of a worm that can spread through large language models (LLMs) by prompt injection, exploiting GenAI- powered applications to perform malicious activities without user interaction. It emphasises the potential risks in the interconnected ecosystems of Generative AI applications. #Cybersecurity #AIWorm #PromptInjection #LLM #GenAIThreats 4
  • 5. ArtPrompt: ASCII Art-based Jailbreak Attacks against Aligned LLMs: This article introduces ArtPrompt, a novel ASCII art-based attack that exploits vulnerabilities in large language models (LLMs) by bypassing safety measures to induce undesired behaviours. This approach highlights the limitations of current LLMs in recognising non-semantic forms of text, such as ASCII art, posing significant security challenges. More on harmful ASCII-art here: ASCII art elicits harmful responses from 5 major AI chatbots. #ArtPrompt #LLMSecurity #ASCIIArtAttack #CyberSecurity #AIChallenges 5
  • 6. Among the AI Doomsayers: The article explores the divide within the tech community regarding the future of artificial intelligence, with some viewing it as a pathway to utopia and others fearing it could lead to humanity's destruction. It delves into personal stories, industry dynamics, and philosophical debates surrounding AI's potential impact, highlighting the complexity and urgency of navigating its development responsibly. #AI #Technology #Future #Ethics #Innovation 6
  • 7. The Terryifying AI Scam That Uses Your Loved One's Voice: This article describes a new AI scam targeting individuals by mimicking the voices of their loved ones to create highly convincing and emotionally manipulative situations for extortion. It highlights the increasing sophistication of AI technologies in cloning voices and the challenges in combating such scams, alongside the emotional and psychological impact on victims. One thing worth considering is the creation of a "Family Safe Word" that can be asked for in a situation where the provenance of a caller is under question. Making sure everyone in the family remembers the safe word without having to write it down is the next challenge. #AIScams #VoiceCloning #DigitalFraud #CyberSecurity #TechEthics 7
  • 8. Public trust in AI is sinking across the board): Public trust in AI and the companies developing it is declining worldwide, with significant drops in trust levels over the past five years, according to Edelman's data. This trend raises concerns as the industry grows and regulators worldwide consider appropriate regulations. #AITrust #TechEthics #PrivacyProtection #AIRegulation #DigitalInnovation 8
  • 9. The Expanding Dark Forest and Generative AI: This article discusses the challenges of distinguishing human-generated content from AI-generated content in an increasingly digitised world. It explores strategies for proving human authenticity online amidst a flood of generative AI content, highlighting the importance of originality, critical thinking, and personal interactions to maintain the uniqueness of human contributions on the web. #AIDarkForest #GenerativeAI #DigitalIdentity #HumanAuthenticity #OnlineInteraction 9
  • 10. Thankyou! hello@matthewsinclair.com matthewsinclair.com masto.ai/@matthewsinclair medium.com/@matthewsinclair twitter.com/@matthewsinclair Originally published on quantumfaxmachine.com If you’d like to sign up for this content as an email, click here to join the mailing list. Image: Photo by Austin Chan on Unsplash 10