BTC $51524.6928
ETH $3102.2833
BNB $384.2776
SOL $103.2311
XRP $0.5405
ADA $0.5849
AVAX $36.9511
TRX $0.1377
DOGE $0.0856
wstETH $3587.3896
LINK $18.6494
DOT $7.8438
WETH $3100.0078
UNI $11.0945
MATIC $0.9971
WBTC $51554.8458
IMX $3.3401
ICP $12.4013
LTC $70.0025
BCH $266.3236
CAKE $3.1426
FIL $8.1456
ETC $27.0947
RNDR $7.2587
DAI $1.0009
KAS $0.1676
HBAR $0.1071
ATOM $10.3461
INJ $35.4309
VET $0.0467
TON $2.0697
OKB $50.3127
FDUSD $0.9994
LDO $3.3633
GRT $0.3004
ARB $1.8920
XMR $128.8577
TIA $16.5811
XLM $0.1156
STX $2.5143
ENS $22.4126
NEAR $3.6605
APEX $2.4601
WEMIX $2.0774
MKR $2060.5410
BEAM $0.0332
MNT $0.8950
BTC $51524.6928
ETH $3102.2833
BNB $384.2776
SOL $103.2311
XRP $0.5405
ADA $0.5849
AVAX $36.9511
TRX $0.1377
DOGE $0.0856
wstETH $3587.3896
LINK $18.6494
DOT $7.8438
WETH $3100.0078
UNI $11.0945
MATIC $0.9971
WBTC $51554.8458
IMX $3.3401
ICP $12.4013
LTC $70.0025
BCH $266.3236
CAKE $3.1426
FIL $8.1456
ETC $27.0947
RNDR $7.2587
DAI $1.0009
KAS $0.1676
HBAR $0.1071
ATOM $10.3461
INJ $35.4309
VET $0.0467
TON $2.0697
OKB $50.3127
FDUSD $0.9994
LDO $3.3633
GRT $0.3004
ARB $1.8920
XMR $128.8577
TIA $16.5811
XLM $0.1156
STX $2.5143
ENS $22.4126
NEAR $3.6605
APEX $2.4601
WEMIX $2.0774
MKR $2060.5410
BEAM $0.0332
MNT $0.8950
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
  • China's use of artificial intelligence is turning it into a lethal weapon.

    The FBI explains how the Celestial Empire is utilising nefarious machine learning with data that was stolen from the US.

    Senior FBI officials expressed particular concern about the threats posed by the rapid development of artificial intelligence, particularly from China, at the FBI Cyber Threats Summit in Atlanta on Wednesday.

    According to Christopher Wray, Director of the FBI, and Brian Warndran, Deputy Director of Cyber Security, cyber threats to the United States come from all over the world, but China is the most dangerous adversary in terms of volume and ability to maliciously use data, thanks in part to the introduction of artificial intelligence-based operations.

    Ray called China a threat "unrivalled among foreign adversaries." He claims that the country has such a large hacker programme that it can easily bypass "all other major countries combined." Ray also predicted that the sheer volume of personal and corporate data stolen by China, combined with the power of artificial intelligence, would spell disaster.

    "We believe that in the future, artificial intelligence will enable attackers to develop increasingly powerful, complex, customizable, and scalable threats - and it will not take them long to do so," Ray said. The FBI director also mentioned that the massive amounts of data stolen by China over the years are ideal for feeding into machine learning models.

    According to the FBI, China is now in a position to close the loop, using the fruits of its large-scale hacks to launch even more powerful hacking attacks using artificial intelligence.

    Vorndran also described a number of malicious machine learning attacks on various data and systems. "The FBI is overly focused on these types of attacks, specifically on what can and does go wrong."

    So far, "high-tech attacks based on malicious machine learning, such as data poisoning, have mostly been found in scientific literature rather than in real-world attacks," Vorndran added. However, he claims that "as the public and private sectors increasingly use artificial intelligence, the attack surface using hostile machine learning will grow in lockstep, as will the potential physical and economic costs of a successful attack."

    The FBI's approach to AI and machine learning is "proactive," according to Vorndran, because the agency "proactively aligns resources to engage with the intelligence community and private sector partners to better understand the technology and its implications."

    The White House is concerned about how quickly artificial intelligence could increase US security concerns. Leading artificial intelligence technology companies have even signed voluntary pledges to prioritise security and data protection when developing their technologies.

    Author DeepWeb
    Simplifying Secure Private Messaging With One-Time Notes
    Jabber Everywhere: Jabber For Linux, Mac, Windows, Apple, And Mobile

    Comments 0

    Add comment