Artificial intelligence: Difference between revisions
m mention Prompt injection |
Change from unarchivable xcancel to archivable nitter catsarch links and fix archive links |
||
| Line 27: | Line 27: | ||
There are several concerns with using online AI models like [[ChatGPT]], not only because they are proprietary, but also because there is no guarantee of where your data will be stored or used. Recent developments in local AI models offer an alternative to online AI models, which can be downloaded from platforms like [https://huggingface.co/ HuggingFace] and used offline. Common models to run include Llama ([[Meta]]), DeepSeek ([[DeepSeek]]), Phi ([[Microsoft]]), Mistral ([[Mistral AI]]), Gemma ([[Google]]). | There are several concerns with using online AI models like [[ChatGPT]], not only because they are proprietary, but also because there is no guarantee of where your data will be stored or used. Recent developments in local AI models offer an alternative to online AI models, which can be downloaded from platforms like [https://huggingface.co/ HuggingFace] and used offline. Common models to run include Llama ([[Meta]]), DeepSeek ([[DeepSeek]]), Phi ([[Microsoft]]), Mistral ([[Mistral AI]]), Gemma ([[Google]]). | ||
In some cases, AI models can be hijacked for malicious purposes. Demonstrated with Comet ([[Perplexity]]), users can run arbitrary prompts to the browser's built-in AI assistant by hiding text in the HTML comments, non-visible webpage text, or simple comments on a webpage.<ref name=":0">{{Cite web |date=Aug 20, 2025 |title=Tweet from Brave |url=https:// | In some cases, AI models can be hijacked for malicious purposes. Demonstrated with Comet ([[Perplexity]]), users can run arbitrary prompts to the browser's built-in AI assistant by hiding text in the HTML comments, non-visible webpage text, or simple comments on a webpage.<ref name=":0">{{Cite web |date=Aug 20, 2025 |title=Tweet from Brave |url=https://nitter.us.catsarch.com/brave/status/1958152314914508893 |url-status=live |archive-url=https://web.archive.org/web/20260321120531/https://nitter.us.catsarch.com/brave/status/1958152314914508893 |archive-date=21 Mar 2026 |access-date=Aug 24, 2025 |website=X (formerly [[Twitter]])}}</ref> These arbitrary prompts can then be exploited to obtain sensitive information or gain unauthorized access to high-value accounts, such as those for banking or gaming libraries.<ref>{{Cite web |date=Aug 23, 2025 |title=Tweet from zack (in SF) |url=https://nitter.us.catsarch.com/zack_overflow/status/1959308058200551721 |url-status=live |archive-url=https://web.archive.org/web/20260321120841/https://nitter.us.catsarch.com/zack_overflow/status/1959308058200551721 |archive-date=21 Mar 2026 |access-date=Aug 24, 2025 |website=X (formerly [[Twitter]])}}</ref> See [[wikipedia:Prompt_injection|Prompt injection]]. | ||
===Unethical maintenance of data centers=== | ===Unethical maintenance of data centers=== | ||