SlideShare a Scribd company logo
Quantum Fax Machine
QFM012: Irresponsible AI Reading
List March 2024
quantumfaxmachine.com
1
QFM012: Irresponsible AI Reading
List March 2024
Here is everything I found interesting about Irresponsible AI during March 2024.
This month's Quantum Fax Machine: Irresponsible AI Reading List explores themes ranging from cybersecurity and
digital deception to the broader societal implications and ethical considerations of AI technology.
In an innovative take on productivity, the tweet "I finally figured out how to skip daily stand-ups" reveals how someone
crafted an AI clone to attend daily stand-up meetings, merging AI into their everyday work life and raising questions
about the future of workplace presence and productivity.
Meanwhile, Bruce Schneier's discussion on a LLM Prompt Injection Worm highlights the cybersecurity threats inherent
in generative AI, where a worm spreads through AI systems without user interaction, suggesting the potential for new
forms of digital vulnerability.
Further exploring AI's darker potential, ArtPrompt: ASCII Art-based Jailbreak Attacks against Aligned LLMs introduces a
method to manipulate AI using ASCII art, bypassing safety measures and exposing limitations in AI's ability to
understand non-semantic text forms. This complements the narrative of digital fraud, as illustrated by a New Yorker
article detailing a scam that uses AI to clone voices of loved ones for extortion: The Terrifying AI Scam That Uses Your
Loved One's Voice. We then look at the decreasing public trust in AI with Public trust in AI is sinking across the board),
underscoring the importance ethical considerations.
Onto philosophy and ethics, Among the AI Doomsayers delves into the divided perceptions of AI's future, from utopian
visions to dystopian fears. Complementing this perspective, The Expanding Dark Forest and Generative AI discusses the
challenge of maintaining human authenticity in an era increasingly dominated by AI-generated content, asking us to
think about what it means to have genuine human interactions online.
As always, the Quantum Fax Machine Propellor Hat Key will guide your browsing. Enjoy!
Key:
: Mentions technology
: Talks about technology in real-world use cases
: Talks about details of machine intelligence technologies
: Using and working with machine intelligence technologies in software
: Programming new machine intelligence concepts and implementations
Source: Photo by Quino Al on Unsplash
2
I finally figured out how to skip daily stand-
ups: This tweet (Xeet?) describes someone
creating an AI clone to participate in daily
stand-up meetings on their behalf. This AI
clone can understand daily activities, listen
to meetings via audio processing, and
respond using a language model.
#AIAssistant #ProductivityHacks
#VirtualMeetings
#InnovationInWork #TechSolutions
3
LLM Prompt Injection Worm: Bruce
Schneier discusses the development and
demonstration of a worm that can spread
through large language models (LLMs) by
prompt injection, exploiting GenAI-
powered applications to perform malicious
activities without user interaction. It
emphasises the potential risks in the
interconnected ecosystems of Generative
AI applications.
#Cybersecurity #AIWorm
#PromptInjection #LLM
#GenAIThreats
4
ArtPrompt: ASCII Art-based Jailbreak Attacks
against Aligned LLMs: This article introduces
ArtPrompt, a novel ASCII art-based attack that
exploits vulnerabilities in large language
models (LLMs) by bypassing safety measures
to induce undesired behaviours. This approach
highlights the limitations of current LLMs in
recognising non-semantic forms of text, such
as ASCII art, posing significant security
challenges. More on harmful ASCII-art here:
ASCII art elicits harmful responses from 5
major AI chatbots.
#ArtPrompt #LLMSecurity
#ASCIIArtAttack #CyberSecurity
#AIChallenges
5
Among the AI Doomsayers: The article
explores the divide within the tech
community regarding the future of artificial
intelligence, with some viewing it as a
pathway to utopia and others fearing it
could lead to humanity's destruction. It
delves into personal stories, industry
dynamics, and philosophical debates
surrounding AI's potential impact,
highlighting the complexity and urgency of
navigating its development responsibly.
#AI #Technology #Future #Ethics
#Innovation
6
The Terryifying AI Scam That Uses Your Loved One's
Voice: This article describes a new AI scam targeting
individuals by mimicking the voices of their loved
ones to create highly convincing and emotionally
manipulative situations for extortion. It highlights
the increasing sophistication of AI technologies in
cloning voices and the challenges in combating such
scams, alongside the emotional and psychological
impact on victims. One thing worth considering is
the creation of a "Family Safe Word" that can be
asked for in a situation where the provenance of a
caller is under question. Making sure everyone in
the family remembers the safe word without having
to write it down is the next challenge.
#AIScams #VoiceCloning #DigitalFraud
#CyberSecurity #TechEthics
7
Public trust in AI is sinking across the
board): Public trust in AI and the companies
developing it is declining worldwide, with
significant drops in trust levels over the
past five years, according to Edelman's
data. This trend raises concerns as the
industry grows and regulators worldwide
consider appropriate regulations.
#AITrust #TechEthics
#PrivacyProtection #AIRegulation
#DigitalInnovation
8
The Expanding Dark Forest and Generative
AI: This article discusses the challenges of
distinguishing human-generated content
from AI-generated content in an increasingly
digitised world. It explores strategies for
proving human authenticity online amidst a
flood of generative AI content, highlighting
the importance of originality, critical thinking,
and personal interactions to maintain the
uniqueness of human contributions on the
web.
#AIDarkForest #GenerativeAI
#DigitalIdentity #HumanAuthenticity
#OnlineInteraction
9
Thankyou!
hello@matthewsinclair.com
matthewsinclair.com
masto.ai/@matthewsinclair
medium.com/@matthewsinclair
twitter.com/@matthewsinclair
Originally published on
quantumfaxmachine.com
If you’d like to sign up for this content as an
email, click here to join the mailing list.
Image: Photo by Austin Chan on Unsplash
10

More Related Content

Similar to 20240414 QFM012 Irresponsible AI Reading List March 2024

[DSC Europe 23] Shahab Anbarjafari - Generative AI: Impact of Responsible AI
[DSC Europe 23] Shahab Anbarjafari - Generative AI: Impact of Responsible AI[DSC Europe 23] Shahab Anbarjafari - Generative AI: Impact of Responsible AI
[DSC Europe 23] Shahab Anbarjafari - Generative AI: Impact of Responsible AI
DataScienceConferenc1
 
Introduction to Artificial Intelligence.pptx
Introduction to Artificial Intelligence.pptxIntroduction to Artificial Intelligence.pptx
Introduction to Artificial Intelligence.pptx
RSAISHANKAR
 
Magazine Febuary-2023-Preview.pdf
Magazine Febuary-2023-Preview.pdfMagazine Febuary-2023-Preview.pdf
Magazine Febuary-2023-Preview.pdf
preetichaubey4
 
What is Artificial Intelligence? : Everything You Need to Know about AI
What is Artificial Intelligence? : Everything You Need to Know about AIWhat is Artificial Intelligence? : Everything You Need to Know about AI
What is Artificial Intelligence? : Everything You Need to Know about AI
DashTechnologiesInc
 
Is AI going to provide safety for us?
Is AI going to provide safety for us?Is AI going to provide safety for us?
Is AI going to provide safety for us?
DLabs
 
Top Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on CybersecurityTop Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on Cybersecurity
Pixel Crayons
 
AI: The New Player in Cybersecurity (Nov. 08, 2023)
AI: The New Player in Cybersecurity (Nov. 08, 2023)AI: The New Player in Cybersecurity (Nov. 08, 2023)
AI: The New Player in Cybersecurity (Nov. 08, 2023)
Takeshi Takahashi
 
Deepfakes Manipulating Reality with AI.pdf
Deepfakes Manipulating Reality with AI.pdfDeepfakes Manipulating Reality with AI.pdf
Deepfakes Manipulating Reality with AI.pdf
IMRAN SIDDIQ
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Social Impact & Ethics of AI by Steve Omohundro
Social Impact & Ethics of AI by Steve OmohundroSocial Impact & Ethics of AI by Steve Omohundro
Social Impact & Ethics of AI by Steve Omohundro
The Hive
 
Icit analysis-signature-based-malware-detection-is-dead
Icit analysis-signature-based-malware-detection-is-deadIcit analysis-signature-based-malware-detection-is-dead
Icit analysis-signature-based-malware-detection-is-dead
Rocco Magnotta
 
Generative AI Future pdf.pdf
Generative AI Future pdf.pdfGenerative AI Future pdf.pdf
Generative AI Future pdf.pdf
YogitaMali7
 
Artificial Intelligence powered malware - A Smart virus
Artificial Intelligence powered malware - A Smart virusArtificial Intelligence powered malware - A Smart virus
Artificial Intelligence powered malware - A Smart virus
Stig-Arne Kristoffersen
 
Challenges and Solution for Artificial Intelligence in Cybersecurity of the USA
Challenges and Solution for Artificial Intelligence in Cybersecurity of the USAChallenges and Solution for Artificial Intelligence in Cybersecurity of the USA
Challenges and Solution for Artificial Intelligence in Cybersecurity of the USA
vishal dineshkumar soni
 
Combating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceCombating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial Intelligence
Inderjeet Singh
 
Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018
joshquarrie
 
AI101 Guide
AI101 GuideAI101 Guide
AI101 Guide
Sajan Mathew 💡
 
AI101 guide
AI101 guideAI101 guide
AI101 guide
Sajan Mathew 💡
 
20240305 QFM008 Irresponsible AI Reading List February 2024
20240305 QFM008 Irresponsible AI Reading List February 202420240305 QFM008 Irresponsible AI Reading List February 2024
20240305 QFM008 Irresponsible AI Reading List February 2024
Matthew Sinclair
 
seminar Report-BE-EEE-8th sem-Artificial intelligence in security managenent
seminar Report-BE-EEE-8th sem-Artificial intelligence in security managenentseminar Report-BE-EEE-8th sem-Artificial intelligence in security managenent
seminar Report-BE-EEE-8th sem-Artificial intelligence in security managenent
MOHAMMED SAQIB
 

Similar to 20240414 QFM012 Irresponsible AI Reading List March 2024 (20)

[DSC Europe 23] Shahab Anbarjafari - Generative AI: Impact of Responsible AI
[DSC Europe 23] Shahab Anbarjafari - Generative AI: Impact of Responsible AI[DSC Europe 23] Shahab Anbarjafari - Generative AI: Impact of Responsible AI
[DSC Europe 23] Shahab Anbarjafari - Generative AI: Impact of Responsible AI
 
Introduction to Artificial Intelligence.pptx
Introduction to Artificial Intelligence.pptxIntroduction to Artificial Intelligence.pptx
Introduction to Artificial Intelligence.pptx
 
Magazine Febuary-2023-Preview.pdf
Magazine Febuary-2023-Preview.pdfMagazine Febuary-2023-Preview.pdf
Magazine Febuary-2023-Preview.pdf
 
What is Artificial Intelligence? : Everything You Need to Know about AI
What is Artificial Intelligence? : Everything You Need to Know about AIWhat is Artificial Intelligence? : Everything You Need to Know about AI
What is Artificial Intelligence? : Everything You Need to Know about AI
 
Is AI going to provide safety for us?
Is AI going to provide safety for us?Is AI going to provide safety for us?
Is AI going to provide safety for us?
 
Top Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on CybersecurityTop Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on Cybersecurity
 
AI: The New Player in Cybersecurity (Nov. 08, 2023)
AI: The New Player in Cybersecurity (Nov. 08, 2023)AI: The New Player in Cybersecurity (Nov. 08, 2023)
AI: The New Player in Cybersecurity (Nov. 08, 2023)
 
Deepfakes Manipulating Reality with AI.pdf
Deepfakes Manipulating Reality with AI.pdfDeepfakes Manipulating Reality with AI.pdf
Deepfakes Manipulating Reality with AI.pdf
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Social Impact & Ethics of AI by Steve Omohundro
Social Impact & Ethics of AI by Steve OmohundroSocial Impact & Ethics of AI by Steve Omohundro
Social Impact & Ethics of AI by Steve Omohundro
 
Icit analysis-signature-based-malware-detection-is-dead
Icit analysis-signature-based-malware-detection-is-deadIcit analysis-signature-based-malware-detection-is-dead
Icit analysis-signature-based-malware-detection-is-dead
 
Generative AI Future pdf.pdf
Generative AI Future pdf.pdfGenerative AI Future pdf.pdf
Generative AI Future pdf.pdf
 
Artificial Intelligence powered malware - A Smart virus
Artificial Intelligence powered malware - A Smart virusArtificial Intelligence powered malware - A Smart virus
Artificial Intelligence powered malware - A Smart virus
 
Challenges and Solution for Artificial Intelligence in Cybersecurity of the USA
Challenges and Solution for Artificial Intelligence in Cybersecurity of the USAChallenges and Solution for Artificial Intelligence in Cybersecurity of the USA
Challenges and Solution for Artificial Intelligence in Cybersecurity of the USA
 
Combating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceCombating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial Intelligence
 
Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018
 
AI101 Guide
AI101 GuideAI101 Guide
AI101 Guide
 
AI101 guide
AI101 guideAI101 guide
AI101 guide
 
20240305 QFM008 Irresponsible AI Reading List February 2024
20240305 QFM008 Irresponsible AI Reading List February 202420240305 QFM008 Irresponsible AI Reading List February 2024
20240305 QFM008 Irresponsible AI Reading List February 2024
 
seminar Report-BE-EEE-8th sem-Artificial intelligence in security managenent
seminar Report-BE-EEE-8th sem-Artificial intelligence in security managenentseminar Report-BE-EEE-8th sem-Artificial intelligence in security managenent
seminar Report-BE-EEE-8th sem-Artificial intelligence in security managenent
 

More from Matthew Sinclair

20240704 QFM023 Engineering Leadership Reading List June 2024
20240704 QFM023 Engineering Leadership Reading List June 202420240704 QFM023 Engineering Leadership Reading List June 2024
20240704 QFM023 Engineering Leadership Reading List June 2024
Matthew Sinclair
 
20240703 QFM022 Elixir Reading List June 2024
20240703 QFM022 Elixir Reading List June 202420240703 QFM022 Elixir Reading List June 2024
20240703 QFM022 Elixir Reading List June 2024
Matthew Sinclair
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
20240608 QFM019 Engineering Leadership Reading List May 2024
20240608 QFM019 Engineering Leadership Reading List May 202420240608 QFM019 Engineering Leadership Reading List May 2024
20240608 QFM019 Engineering Leadership Reading List May 2024
Matthew Sinclair
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
Matthew Sinclair
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
Matthew Sinclair
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
Matthew Sinclair
 
20240413 QFM011 Engineering Leadership Reading List March 2024
20240413 QFM011 Engineering Leadership Reading List March 202420240413 QFM011 Engineering Leadership Reading List March 2024
20240413 QFM011 Engineering Leadership Reading List March 2024
Matthew Sinclair
 
20240412 QFM010 Elixir Reading List March 2024
20240412 QFM010 Elixir Reading List March 202420240412 QFM010 Elixir Reading List March 2024
20240412 QFM010 Elixir Reading List March 2024
Matthew Sinclair
 
20240411 QFM009 Machine Intelligence Reading List March 2024
20240411 QFM009 Machine Intelligence Reading List March 202420240411 QFM009 Machine Intelligence Reading List March 2024
20240411 QFM009 Machine Intelligence Reading List March 2024
Matthew Sinclair
 
20240303 QFM006 Elixir Reading List February 2024
20240303 QFM006 Elixir Reading List February 202420240303 QFM006 Elixir Reading List February 2024
20240303 QFM006 Elixir Reading List February 2024
Matthew Sinclair
 
20240304 QFM007 Engineering Leadership Reading List February 2024
20240304 QFM007 Engineering Leadership Reading List February 202420240304 QFM007 Engineering Leadership Reading List February 2024
20240304 QFM007 Engineering Leadership Reading List February 2024
Matthew Sinclair
 
FinovateEurope 2024 Summary Insights Demos
FinovateEurope 2024 Summary Insights DemosFinovateEurope 2024 Summary Insights Demos
FinovateEurope 2024 Summary Insights Demos
Matthew Sinclair
 

More from Matthew Sinclair (14)

20240704 QFM023 Engineering Leadership Reading List June 2024
20240704 QFM023 Engineering Leadership Reading List June 202420240704 QFM023 Engineering Leadership Reading List June 2024
20240704 QFM023 Engineering Leadership Reading List June 2024
 
20240703 QFM022 Elixir Reading List June 2024
20240703 QFM022 Elixir Reading List June 202420240703 QFM022 Elixir Reading List June 2024
20240703 QFM022 Elixir Reading List June 2024
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
20240608 QFM019 Engineering Leadership Reading List May 2024
20240608 QFM019 Engineering Leadership Reading List May 202420240608 QFM019 Engineering Leadership Reading List May 2024
20240608 QFM019 Engineering Leadership Reading List May 2024
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
20240413 QFM011 Engineering Leadership Reading List March 2024
20240413 QFM011 Engineering Leadership Reading List March 202420240413 QFM011 Engineering Leadership Reading List March 2024
20240413 QFM011 Engineering Leadership Reading List March 2024
 
20240412 QFM010 Elixir Reading List March 2024
20240412 QFM010 Elixir Reading List March 202420240412 QFM010 Elixir Reading List March 2024
20240412 QFM010 Elixir Reading List March 2024
 
20240411 QFM009 Machine Intelligence Reading List March 2024
20240411 QFM009 Machine Intelligence Reading List March 202420240411 QFM009 Machine Intelligence Reading List March 2024
20240411 QFM009 Machine Intelligence Reading List March 2024
 
20240303 QFM006 Elixir Reading List February 2024
20240303 QFM006 Elixir Reading List February 202420240303 QFM006 Elixir Reading List February 2024
20240303 QFM006 Elixir Reading List February 2024
 
20240304 QFM007 Engineering Leadership Reading List February 2024
20240304 QFM007 Engineering Leadership Reading List February 202420240304 QFM007 Engineering Leadership Reading List February 2024
20240304 QFM007 Engineering Leadership Reading List February 2024
 
FinovateEurope 2024 Summary Insights Demos
FinovateEurope 2024 Summary Insights DemosFinovateEurope 2024 Summary Insights Demos
FinovateEurope 2024 Summary Insights Demos
 

Recently uploaded

Generative AI Reasoning Tech Talk - July 2024
Generative AI Reasoning Tech Talk - July 2024Generative AI Reasoning Tech Talk - July 2024
Generative AI Reasoning Tech Talk - July 2024
siddu769252
 
NVIDIA at Breakthrough Discuss for Space Exploration
NVIDIA at Breakthrough Discuss for Space ExplorationNVIDIA at Breakthrough Discuss for Space Exploration
NVIDIA at Breakthrough Discuss for Space Exploration
Alison B. Lowndes
 
Increase Quality with User Access Policies - July 2024
Increase Quality with User Access Policies - July 2024Increase Quality with User Access Policies - July 2024
Increase Quality with User Access Policies - July 2024
Peter Caitens
 
FIDO Munich Seminar: FIDO Tech Principles.pptx
FIDO Munich Seminar: FIDO Tech Principles.pptxFIDO Munich Seminar: FIDO Tech Principles.pptx
FIDO Munich Seminar: FIDO Tech Principles.pptx
FIDO Alliance
 
FIDO Munich Seminar Blueprint for In-Vehicle Payment Standard.pptx
FIDO Munich Seminar Blueprint for In-Vehicle Payment Standard.pptxFIDO Munich Seminar Blueprint for In-Vehicle Payment Standard.pptx
FIDO Munich Seminar Blueprint for In-Vehicle Payment Standard.pptx
FIDO Alliance
 
The History of Embeddings & Multimodal Embeddings
The History of Embeddings & Multimodal EmbeddingsThe History of Embeddings & Multimodal Embeddings
The History of Embeddings & Multimodal Embeddings
Zilliz
 
Redefining Cybersecurity with AI Capabilities
Redefining Cybersecurity with AI CapabilitiesRedefining Cybersecurity with AI Capabilities
Redefining Cybersecurity with AI Capabilities
Priyanka Aash
 
TrustArc Webinar - Innovating with TRUSTe Responsible AI Certification
TrustArc Webinar - Innovating with TRUSTe Responsible AI CertificationTrustArc Webinar - Innovating with TRUSTe Responsible AI Certification
TrustArc Webinar - Innovating with TRUSTe Responsible AI Certification
TrustArc
 
Discovery Series - Zero to Hero - Task Mining Session 1
Discovery Series - Zero to Hero - Task Mining Session 1Discovery Series - Zero to Hero - Task Mining Session 1
Discovery Series - Zero to Hero - Task Mining Session 1
DianaGray10
 
How UiPath Discovery Suite supports identification of Agentic Process Automat...
How UiPath Discovery Suite supports identification of Agentic Process Automat...How UiPath Discovery Suite supports identification of Agentic Process Automat...
How UiPath Discovery Suite supports identification of Agentic Process Automat...
DianaGray10
 
Self-Healing Test Automation Framework - Healenium
Self-Healing Test Automation Framework - HealeniumSelf-Healing Test Automation Framework - Healenium
Self-Healing Test Automation Framework - Healenium
Knoldus Inc.
 
Finetuning GenAI For Hacking and Defending
Finetuning GenAI For Hacking and DefendingFinetuning GenAI For Hacking and Defending
Finetuning GenAI For Hacking and Defending
Priyanka Aash
 
Retrieval Augmented Generation Evaluation with Ragas
Retrieval Augmented Generation Evaluation with RagasRetrieval Augmented Generation Evaluation with Ragas
Retrieval Augmented Generation Evaluation with Ragas
Zilliz
 
It's your unstructured data: How to get your GenAI app to production (and spe...
It's your unstructured data: How to get your GenAI app to production (and spe...It's your unstructured data: How to get your GenAI app to production (and spe...
It's your unstructured data: How to get your GenAI app to production (and spe...
Zilliz
 
FIDO Munich Seminar: Securing Smart Car.pptx
FIDO Munich Seminar: Securing Smart Car.pptxFIDO Munich Seminar: Securing Smart Car.pptx
FIDO Munich Seminar: Securing Smart Car.pptx
FIDO Alliance
 
Indian Privacy law & Infosec for Startups
Indian Privacy law & Infosec for StartupsIndian Privacy law & Infosec for Startups
Indian Privacy law & Infosec for Startups
AMol NAik
 
Mule Experience Hub and Release Channel with Java 17
Mule Experience Hub and Release Channel with Java 17Mule Experience Hub and Release Channel with Java 17
Mule Experience Hub and Release Channel with Java 17
Bhajan Mehta
 
"Building Future-Ready Apps with .NET 8 and Azure Serverless Ecosystem", Stan...
"Building Future-Ready Apps with .NET 8 and Azure Serverless Ecosystem", Stan..."Building Future-Ready Apps with .NET 8 and Azure Serverless Ecosystem", Stan...
"Building Future-Ready Apps with .NET 8 and Azure Serverless Ecosystem", Stan...
Fwdays
 
Cracking AI Black Box - Strategies for Customer-centric Enterprise Excellence
Cracking AI Black Box - Strategies for Customer-centric Enterprise ExcellenceCracking AI Black Box - Strategies for Customer-centric Enterprise Excellence
Cracking AI Black Box - Strategies for Customer-centric Enterprise Excellence
Quentin Reul
 
UiPath Community Day Amsterdam: Code, Collaborate, Connect
UiPath Community Day Amsterdam: Code, Collaborate, ConnectUiPath Community Day Amsterdam: Code, Collaborate, Connect
UiPath Community Day Amsterdam: Code, Collaborate, Connect
UiPathCommunity
 

Recently uploaded (20)

Generative AI Reasoning Tech Talk - July 2024
Generative AI Reasoning Tech Talk - July 2024Generative AI Reasoning Tech Talk - July 2024
Generative AI Reasoning Tech Talk - July 2024
 
NVIDIA at Breakthrough Discuss for Space Exploration
NVIDIA at Breakthrough Discuss for Space ExplorationNVIDIA at Breakthrough Discuss for Space Exploration
NVIDIA at Breakthrough Discuss for Space Exploration
 
Increase Quality with User Access Policies - July 2024
Increase Quality with User Access Policies - July 2024Increase Quality with User Access Policies - July 2024
Increase Quality with User Access Policies - July 2024
 
FIDO Munich Seminar: FIDO Tech Principles.pptx
FIDO Munich Seminar: FIDO Tech Principles.pptxFIDO Munich Seminar: FIDO Tech Principles.pptx
FIDO Munich Seminar: FIDO Tech Principles.pptx
 
FIDO Munich Seminar Blueprint for In-Vehicle Payment Standard.pptx
FIDO Munich Seminar Blueprint for In-Vehicle Payment Standard.pptxFIDO Munich Seminar Blueprint for In-Vehicle Payment Standard.pptx
FIDO Munich Seminar Blueprint for In-Vehicle Payment Standard.pptx
 
The History of Embeddings & Multimodal Embeddings
The History of Embeddings & Multimodal EmbeddingsThe History of Embeddings & Multimodal Embeddings
The History of Embeddings & Multimodal Embeddings
 
Redefining Cybersecurity with AI Capabilities
Redefining Cybersecurity with AI CapabilitiesRedefining Cybersecurity with AI Capabilities
Redefining Cybersecurity with AI Capabilities
 
TrustArc Webinar - Innovating with TRUSTe Responsible AI Certification
TrustArc Webinar - Innovating with TRUSTe Responsible AI CertificationTrustArc Webinar - Innovating with TRUSTe Responsible AI Certification
TrustArc Webinar - Innovating with TRUSTe Responsible AI Certification
 
Discovery Series - Zero to Hero - Task Mining Session 1
Discovery Series - Zero to Hero - Task Mining Session 1Discovery Series - Zero to Hero - Task Mining Session 1
Discovery Series - Zero to Hero - Task Mining Session 1
 
How UiPath Discovery Suite supports identification of Agentic Process Automat...
How UiPath Discovery Suite supports identification of Agentic Process Automat...How UiPath Discovery Suite supports identification of Agentic Process Automat...
How UiPath Discovery Suite supports identification of Agentic Process Automat...
 
Self-Healing Test Automation Framework - Healenium
Self-Healing Test Automation Framework - HealeniumSelf-Healing Test Automation Framework - Healenium
Self-Healing Test Automation Framework - Healenium
 
Finetuning GenAI For Hacking and Defending
Finetuning GenAI For Hacking and DefendingFinetuning GenAI For Hacking and Defending
Finetuning GenAI For Hacking and Defending
 
Retrieval Augmented Generation Evaluation with Ragas
Retrieval Augmented Generation Evaluation with RagasRetrieval Augmented Generation Evaluation with Ragas
Retrieval Augmented Generation Evaluation with Ragas
 
It's your unstructured data: How to get your GenAI app to production (and spe...
It's your unstructured data: How to get your GenAI app to production (and spe...It's your unstructured data: How to get your GenAI app to production (and spe...
It's your unstructured data: How to get your GenAI app to production (and spe...
 
FIDO Munich Seminar: Securing Smart Car.pptx
FIDO Munich Seminar: Securing Smart Car.pptxFIDO Munich Seminar: Securing Smart Car.pptx
FIDO Munich Seminar: Securing Smart Car.pptx
 
Indian Privacy law & Infosec for Startups
Indian Privacy law & Infosec for StartupsIndian Privacy law & Infosec for Startups
Indian Privacy law & Infosec for Startups
 
Mule Experience Hub and Release Channel with Java 17
Mule Experience Hub and Release Channel with Java 17Mule Experience Hub and Release Channel with Java 17
Mule Experience Hub and Release Channel with Java 17
 
"Building Future-Ready Apps with .NET 8 and Azure Serverless Ecosystem", Stan...
"Building Future-Ready Apps with .NET 8 and Azure Serverless Ecosystem", Stan..."Building Future-Ready Apps with .NET 8 and Azure Serverless Ecosystem", Stan...
"Building Future-Ready Apps with .NET 8 and Azure Serverless Ecosystem", Stan...
 
Cracking AI Black Box - Strategies for Customer-centric Enterprise Excellence
Cracking AI Black Box - Strategies for Customer-centric Enterprise ExcellenceCracking AI Black Box - Strategies for Customer-centric Enterprise Excellence
Cracking AI Black Box - Strategies for Customer-centric Enterprise Excellence
 
UiPath Community Day Amsterdam: Code, Collaborate, Connect
UiPath Community Day Amsterdam: Code, Collaborate, ConnectUiPath Community Day Amsterdam: Code, Collaborate, Connect
UiPath Community Day Amsterdam: Code, Collaborate, Connect
 

20240414 QFM012 Irresponsible AI Reading List March 2024

  • 1. Quantum Fax Machine QFM012: Irresponsible AI Reading List March 2024 quantumfaxmachine.com 1
  • 2. QFM012: Irresponsible AI Reading List March 2024 Here is everything I found interesting about Irresponsible AI during March 2024. This month's Quantum Fax Machine: Irresponsible AI Reading List explores themes ranging from cybersecurity and digital deception to the broader societal implications and ethical considerations of AI technology. In an innovative take on productivity, the tweet "I finally figured out how to skip daily stand-ups" reveals how someone crafted an AI clone to attend daily stand-up meetings, merging AI into their everyday work life and raising questions about the future of workplace presence and productivity. Meanwhile, Bruce Schneier's discussion on a LLM Prompt Injection Worm highlights the cybersecurity threats inherent in generative AI, where a worm spreads through AI systems without user interaction, suggesting the potential for new forms of digital vulnerability. Further exploring AI's darker potential, ArtPrompt: ASCII Art-based Jailbreak Attacks against Aligned LLMs introduces a method to manipulate AI using ASCII art, bypassing safety measures and exposing limitations in AI's ability to understand non-semantic text forms. This complements the narrative of digital fraud, as illustrated by a New Yorker article detailing a scam that uses AI to clone voices of loved ones for extortion: The Terrifying AI Scam That Uses Your Loved One's Voice. We then look at the decreasing public trust in AI with Public trust in AI is sinking across the board), underscoring the importance ethical considerations. Onto philosophy and ethics, Among the AI Doomsayers delves into the divided perceptions of AI's future, from utopian visions to dystopian fears. Complementing this perspective, The Expanding Dark Forest and Generative AI discusses the challenge of maintaining human authenticity in an era increasingly dominated by AI-generated content, asking us to think about what it means to have genuine human interactions online. As always, the Quantum Fax Machine Propellor Hat Key will guide your browsing. Enjoy! Key: : Mentions technology : Talks about technology in real-world use cases : Talks about details of machine intelligence technologies : Using and working with machine intelligence technologies in software : Programming new machine intelligence concepts and implementations Source: Photo by Quino Al on Unsplash 2
  • 3. I finally figured out how to skip daily stand- ups: This tweet (Xeet?) describes someone creating an AI clone to participate in daily stand-up meetings on their behalf. This AI clone can understand daily activities, listen to meetings via audio processing, and respond using a language model. #AIAssistant #ProductivityHacks #VirtualMeetings #InnovationInWork #TechSolutions 3
  • 4. LLM Prompt Injection Worm: Bruce Schneier discusses the development and demonstration of a worm that can spread through large language models (LLMs) by prompt injection, exploiting GenAI- powered applications to perform malicious activities without user interaction. It emphasises the potential risks in the interconnected ecosystems of Generative AI applications. #Cybersecurity #AIWorm #PromptInjection #LLM #GenAIThreats 4
  • 5. ArtPrompt: ASCII Art-based Jailbreak Attacks against Aligned LLMs: This article introduces ArtPrompt, a novel ASCII art-based attack that exploits vulnerabilities in large language models (LLMs) by bypassing safety measures to induce undesired behaviours. This approach highlights the limitations of current LLMs in recognising non-semantic forms of text, such as ASCII art, posing significant security challenges. More on harmful ASCII-art here: ASCII art elicits harmful responses from 5 major AI chatbots. #ArtPrompt #LLMSecurity #ASCIIArtAttack #CyberSecurity #AIChallenges 5
  • 6. Among the AI Doomsayers: The article explores the divide within the tech community regarding the future of artificial intelligence, with some viewing it as a pathway to utopia and others fearing it could lead to humanity's destruction. It delves into personal stories, industry dynamics, and philosophical debates surrounding AI's potential impact, highlighting the complexity and urgency of navigating its development responsibly. #AI #Technology #Future #Ethics #Innovation 6
  • 7. The Terryifying AI Scam That Uses Your Loved One's Voice: This article describes a new AI scam targeting individuals by mimicking the voices of their loved ones to create highly convincing and emotionally manipulative situations for extortion. It highlights the increasing sophistication of AI technologies in cloning voices and the challenges in combating such scams, alongside the emotional and psychological impact on victims. One thing worth considering is the creation of a "Family Safe Word" that can be asked for in a situation where the provenance of a caller is under question. Making sure everyone in the family remembers the safe word without having to write it down is the next challenge. #AIScams #VoiceCloning #DigitalFraud #CyberSecurity #TechEthics 7
  • 8. Public trust in AI is sinking across the board): Public trust in AI and the companies developing it is declining worldwide, with significant drops in trust levels over the past five years, according to Edelman's data. This trend raises concerns as the industry grows and regulators worldwide consider appropriate regulations. #AITrust #TechEthics #PrivacyProtection #AIRegulation #DigitalInnovation 8
  • 9. The Expanding Dark Forest and Generative AI: This article discusses the challenges of distinguishing human-generated content from AI-generated content in an increasingly digitised world. It explores strategies for proving human authenticity online amidst a flood of generative AI content, highlighting the importance of originality, critical thinking, and personal interactions to maintain the uniqueness of human contributions on the web. #AIDarkForest #GenerativeAI #DigitalIdentity #HumanAuthenticity #OnlineInteraction 9
  • 10. Thankyou! hello@matthewsinclair.com matthewsinclair.com masto.ai/@matthewsinclair medium.com/@matthewsinclair twitter.com/@matthewsinclair Originally published on quantumfaxmachine.com If you’d like to sign up for this content as an email, click here to join the mailing list. Image: Photo by Austin Chan on Unsplash 10