Skip to main content

The AI can be the new tool for hacking.



The AI or LLM is a tool that can generate code very fast. There are no errors in that code, and that makes it possible to create complicated code with very high speed and accuracy. The generative pre-trained transformer, GPT is the tool that can make it possible to create complicated code by giving orders to the language model. But can those tools be used for hacking? 

Development of the hacking and malware tools should be denied. So that means hackers cannot make the code using GPT by ordering it to create spy- or other malware. 

The hackers can benefit codes and other types of data, that the GPT collects for them. However, the hackers must have the right skills to customize that code. This kind of AI is safe. Or it should be safe. We know that by using command series is possible for high-level coders to cheat the AI to create malware. And that is one thing that should keep us alerted. The AI is the tool that can turn traditional coding into history. 

The estrade is left for the top-level coders who can customize and modify the code, that the AI created. Those people give orders to AI to create code. And then that person can copy-paste that code to the coder editor. By connecting the AI with the code editor the coder can customize those codes. 

But we know. That there are people who are willing to pay for hacking and hacking tools. It's possible that somebody gets the AI's source code, and then customizes it. That kind of tool can be a very powerful tool for hacking. The knowledge about coding helps the hackers to create necessary customization into the codes. That changes the AI into a hacking and spyware generator. 

In regular AI creation, the malware is prohibited and denied. But there are almost certainly the military or intelligence versions of the well-known AI's. Those military and intelligence AIs allow to creation of malicious software. Those military GPT's source codes are secretive. But it's possible, that somebody sells those codes in black marketing. 

The AI can also control the attacks by using the captured computers. AI-based software can control the attacks from the neural networks. The system can switch the computer and its IP automatically. That makes it harder to deny or locate certain computers. The bot network can attack targeted systems using differnet IP addresses. 


https://www.freethink.com/robots-ai/ai-hacking

Comments

Popular posts from this blog

Today Friedrich Nietzsche's overman is more topical than ever before.

 Today Friedrich Nietzsche's overman is more topical than ever before.  The overman and the AI: AI will never make decisions for humans. Except if humans will not allow the AI to make that thing. If people who have free will allow the AI to make decisions for them, that thing is made possible. The AI can take control.  But in this case, humans allow it to make that thing. Humans are things that give the tools to AI to take control. In the same way, we can ask, "Why do some people, like bloody dictators rise to power"? The answer is simple. People who support those dictators are also responsible for dictators staying in control  Friedrich Nietzsche and his "overman" or "over human" theory that the creature with higher morals, higher capacity, and higher intelligence level abilities will rise over "regular people". Nietzsche created his idea from the people's need to be under control, and he mentioned that character in his novel "Antic

The string theory offers a new way to calculate Pi.

"Scientists discovered a new series for pi through string theory research, echoing a 15th-century formula by Madhava. By combining Euler-Beta Functions and Feynman Diagrams, they modeled particle interactions efficiently. Credit: SciTechDaily.com" (ScitechDaily, String Theory Unravels New Pi Formula: A Quantum Leap in Mathematics) People normally think that. The pi is the ratio of the circumference circle's circumference to the circle's diameter. The Pi is a mathematical constant 3.14159..., the endless decimal number. The Pi is interesting because developers can use that decimal number to make the encryption algorithms stronger.  The idea is that the encryptions program hides the message's original ASCII numbers by multiplicating those numbers with some decimal number. Or the system can add some numbers to those ASCII numbers.  "Aninda Sinha (left) and Arnab Saha (right). Credit: Manu Y" (ScitechDaily, String Theory Unravels New Pi Formula: A Quantum Le

Schrödinger's cat: and the limits of that idea.

"In quantum mechanics, Schrödinger's cat is a thought experiment concerning quantum superposition". (Wikipedia, Schrödinger's cat). But the same thing can use as model for many other thought experiments.  Sooner or later, or at least in the ultimate end of the universe, the Schrödinger's cat will turn into wave movement. The information that this cat involved exists but the cat does not exist in its material form. The information doesn't ever vanish. It just turns its shape.  We are all trapped in the universe and time. The universe is the space that is entirety to us. There are no confirmed other universities. But the multiverse is a logical continuum for the expanding galactic megastructures.  The problem with natural things is this. They are black and white. They exist or do not exist. Could there be something, that exists and not exists at the same time?  Scrödinger's cat is thinking experiment about case their cat is not dead or not alive. But in this