Artificial intelligence: Difference between revisions
CopyeditorHF (talk | contribs) Reworded in a more professional manner, improved readability. Request for additional citations. (Glossed over the "under review notice." Oops.) |
m Added reference archive. Tags: Mobile edit Mobile web edit Visual edit |
||
| Line 27: | Line 27: | ||
There are several concerns with using online AI models like [[ChatGPT]], not only because they are proprietary, but also because there is no guarantee of where your data will be stored or used. Recent developments in local AI models offer an alternative to online AI models, which can be downloaded from platforms like [https://huggingface.co/ HuggingFace] and used offline. Common models to run include Llama ([[Meta]]), DeepSeek ([[DeepSeek]]), Phi ([[Microsoft]]), Mistral ([[Mistral AI]]), Gemma ([[Google]]). | There are several concerns with using online AI models like [[ChatGPT]], not only because they are proprietary, but also because there is no guarantee of where your data will be stored or used. Recent developments in local AI models offer an alternative to online AI models, which can be downloaded from platforms like [https://huggingface.co/ HuggingFace] and used offline. Common models to run include Llama ([[Meta]]), DeepSeek ([[DeepSeek]]), Phi ([[Microsoft]]), Mistral ([[Mistral AI]]), Gemma ([[Google]]). | ||
In some cases, AI models can be hijacked for malicious purposes. Demonstrated with Comet ([[Perplexity]]), users can run arbitrary prompts to the browser's built-in AI assistant by hiding text in the HTML comments, non-visible webpage text, or simple comments on a webpage.<ref>{{Cite web |date=Aug 20, 2025 |title=Tweet from Brave |url=https://xcancel.com/brave/status/1958152314914508893#m |access-date=Aug 24, 2025 |website=X (formerly [[Twitter]])}}</ref> These arbitrary prompts can then be exploited to obtain sensitive information or gain unauthorized access to high-value accounts, such as those for banking or gaming libraries.<ref>{{Cite web |date=Aug 23, 2025 |title=Tweet from zack (in SF) |url=https://xcancel.com/zack_overflow/status/1959308058200551721 |access-date=Aug 24, 2025 |website=X (formerly [[Twitter]]) |url-status=live |archive-url=http://web.archive.org/web/20250824201111/https://xcancel.com/zack_overflow/status/1959308058200551721 |archive-date=24 Aug 2025}}</ref> | In some cases, AI models can be hijacked for malicious purposes. Demonstrated with Comet ([[Perplexity]]), users can run arbitrary prompts to the browser's built-in AI assistant by hiding text in the HTML comments, non-visible webpage text, or simple comments on a webpage.<ref name=":0">{{Cite web |date=Aug 20, 2025 |title=Tweet from Brave |url=https://xcancel.com/brave/status/1958152314914508893#m |archive-url=http://web.archive.org/web/20260320084736/https://xcancel.com/brave/status/1958152314914508893#m |archive-date=2026-20-3 |access-date=Aug 24, 2025 |website=X (formerly [[Twitter]])}}</ref> These arbitrary prompts can then be exploited to obtain sensitive information or gain unauthorized access to high-value accounts, such as those for banking or gaming libraries.<ref>{{Cite web |date=Aug 23, 2025 |title=Tweet from zack (in SF) |url=https://xcancel.com/zack_overflow/status/1959308058200551721 |access-date=Aug 24, 2025 |website=X (formerly [[Twitter]]) |url-status=live |archive-url=http://web.archive.org/web/20250824201111/https://xcancel.com/zack_overflow/status/1959308058200551721 |archive-date=24 Aug 2025}}</ref> | ||
===Unethical maintenance of data centers=== | ===Unethical maintenance of data centers=== | ||
| Line 38: | Line 38: | ||
==References== | ==References== | ||
{{Reflist}} | {{Reflist}}<ref name=":0" /> | ||
[[Category:Artificial intelligence]] | [[Category:Artificial intelligence]] | ||