No big surprise here. Researchers have gotten full read and write access to Meta’s Bloom, Meta-Llama and Pythia large language models in a typical example of supply chain risk. If they had been hackers or a non-friendly nation, they could have poisoned the training data, stolen the models and datasets and other unfriendly things. AI […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
While basically unenforceable, the agreement is a starting point. The US, UK and 23 domestic and international cybersecurity organizations, representing more than a dozen countries, signed on to the Guidelines for Secure AI Development. The Guidelines, complementing the U.S. Voluntary Commitments on Ensuring Safe, Secure, and Trustworthy AI, provide essential recommendations for AI system development and […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Post Quantum Crypto Isn’t The Only Problem – Pre Stone Age Crypto is Also a Problem While some folks are worried about what is going to happen to encryption when quantum computing becomes real, other companies are still using antique crypto. Unfortunately, many of the companies who are using antiques are medical devices and higher […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Post Quantum Crypto Isn’t The Only Problem – Pre Stone Age Crypto is Also a Problem While some folks are worried about what is going to happen to encryption when quantum computing becomes real, other companies are still using antique crypto. Unfortunately, many of the companies who are using antiques are medical devices and higher […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
You may remember a few months ago that Elon said it was very important to put a pause on AI until we could figure out how to do that safely. I guess he has figured that out. Say hello to GROK. Grok, according to the dictionary, means “understand (something) intuitively or by empathy”. While other […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Researchers are highly skeptical about the claim of another scientist who says that he has developed an inexpensive system to crack RSA encryption, the most commonly used public key encryption. The researcher who claims to have cracked RSA is Ed Gerck. According to his LinkedIn profile, he is a quantum computing developer at a company […]
Continue reading →
[DISPLAY_ACURAX_ICONS]