• News
    • Bitcoin
    • Altcoins
    • Blockchain
    • DeFi
    • Regulation
    • Scams
  • NFT
  • Metaverse
  • Analysis
  • Learn
  • Videos
  • Blogs
  • Market Cap
  • Shop
What's Hot

🚀 SpaceX vs Tesla Share War Begins! ⚡️FSD Solved + Datacenter Shockwave! 🔥

2025-12-11

Who really controls Bitcoin’s price? 🤔

2025-12-11

This Is Worse Than I Thought…

2025-12-11

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

Facebook Twitter Instagram
Crypto Investor News Network
  • News
    • Bitcoin
    • Altcoins
    • Blockchain
    • DeFi
    • Regulation
    • Scams
  • NFT

    Bitcoin Just Hit an All-Time High. Nobody Cares

    2025-09-11

    All Eyes on Art: Upcoming Collections to Watch the Week of May 27

    2025-09-11

    Bitcoin Vegas Belongs to the Suits Now

    2025-09-11

    NFC Summit Lisbon Founder on Evolving the Event and Weathering the Market

    2025-09-11

    All Eyes on Art: Upcoming Collections to Watch the Week of June 3

    2025-09-10
  • Metaverse

    Shib: The Metaverse – Part of the Expanding Shiba Inu Ecosystem

    2025-01-03

    Experience to Earn: Everdome’s Metaverse Frontier

    2024-12-30

    Beyond Bots: Meta Motivo and the Dawn of Humanlike Digital Life

    2024-12-13

    Exploring NetVRk: What Is Behind This AI-Driven Virtual Universe?

    2024-10-28

    Council of Europe Highlights Metaverse’s Impact on Privacy and Democracy

    2024-09-05
  • Analysis

    Crypto Exchange Coinbase Lists New DeFi Altcoin Project Built on Base Blockchain

    2023-12-13

    Ethereum Price Bears Keep Pushing, Why Decline Isn’t Over Yet

    2023-12-13

    Trader Bullish on Cosmos (ATOM), Says One Dogecoin Rival Setting Up for Next Leg Up – Here’s His Outlook

    2023-12-13

    AVAX Price Pumps 50% and Dumps 15%, Why Uptrend Is Still Strong

    2023-12-13

    Top Trader Predicts Parabolic Rally for Solana Competitor – Here’s His Upside Target

    2023-12-13
  • Learn

    Win Tangem Rings and Cards, OneKey Wallets, and a MacBook Pro

    2025-12-09

    What Is a Crypto Wallet Address? A Beginner’s Guide

    2025-12-06

    What Is a Seed Phrase in Crypto? A Beginner’s Guide to Wallet Security

    2025-12-05

    Practical Strategies for New Traders

    2025-12-05

    Types of Cryptocurrency Explained Simply: Coins, Tokens, and Beyond

    2025-12-05
  • Videos

    🚀 SpaceX vs Tesla Share War Begins! ⚡️FSD Solved + Datacenter Shockwave! 🔥

    2025-12-11

    Who really controls Bitcoin’s price? 🤔

    2025-12-11

    This Is Worse Than I Thought…

    2025-12-11

    Bitcoin’s Next HUGE Move After Fed Decision

    2025-12-11

    Ben Cowen: 2025 Review & What’s Coming for Crypto in 2026

    2025-12-11
  • Blogs
  • Market Cap
  • Shop
Facebook Twitter Instagram TikTok
Crypto Investor News Network
Home»Regulation»Whatever happened to security? Privacy?
Regulation

Whatever happened to security? Privacy?

2024-03-30No Comments4 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
AI’s Brave New World: Whatever happened to security? Privacy?
Share
Facebook Twitter LinkedIn Pinterest Email

The following is a guest post from John deVadoss, Governing Board of the Global Blockchain Business Council in Geneva and co-founder of the InterWork Alliance in Washington, DC.

Last week, I had the opportunity in Washington, DC to present and discuss the implications of AI relating to Security with some members of Congress and their staff.

Generative AI today reminds me of the Internet in the late 80s – fundamental research, latent potential, and academic usage, but it is not yet ready for the public. This time, unfettered vendor ambition, fueled by minor-league venture capital and galvanized by Twitter echo chambers, is fast-tracking AI’s Brave New World.

The so-called “public” foundation models are tainted and inappropriate for consumer and commercial use; privacy abstractions, where they exist, leak like a sieve; security constructs are very much a work in progress, as the attack surface area and the threat vectors are still being understood; and the illusory guardrails, the less that is said about them, the better.

So, how did we end up here? And whatever happened to Security? Privacy?

“Compromised” Foundation Models

The so-called “open” models are anything but open. Different vendors tout their degrees of openness by opening up access to the model weights, or the documentation, or the tests. Still, none of the major vendors provide anything close to the training data sets or their manifests or lineage to be able to replicate and reproduce their models.

This opacity with respect to the training data sets means that if you wish to use one or more of these models, then you, as a consumer or as an organization, do not have any ability to verify or validate the extent of the data pollution with respect to IP, copyrights, etc. as well as potentially illegal content.

See also  US Gov VS Bitcoin Privacy - Could it Become Illegal?

Critically, without the manifest of the training data sets, there is no way to verify or validate the non-existent malicious content. Nefarious actors, including state-sponsored actors, plant trojan horse content across the web that the models ingest during their training, leading to unpredictable and potentially malicious side effects at inference time.

Remember, once a model is compromised, there is no way for it to unlearn, the only option is to destroy it.

“Porous” Security

Generative AI models are the ultimate security honeypots as “all” data has been ingested into one container. New classes and categories of attack vectors arise in the era of AI; the industry is yet to come to terms with the implications both with respect to securing these models from cyber threats and, with respect to how these models are used as tools by cyberthreat actors.

Malicious prompt injection techniques may be used to poison the index; data poisoning may be used to corrupt the weights; embedding attacks, including inversion techniques, may be used to pull rich data out of the embeddings; membership inference may be used to determine whether certain data was in the training set, etc., and this is just the tip of the iceberg.

Threat actors may gain access to confidential data via model inversion and programmatic query; they may corrupt or otherwise influence the model’s latent behavior; and, as mentioned earlier, the out-of-control ingestion of data at large leads to the threat of embedded state-sponsored cyber activity via trojan horses and more.

“Leaky” Privacy

AI models are helpful because of the data sets that they are trained on; indiscriminate ingestion of data at scale creates unprecedented privacy risks for the individual and for the public at large. In the era of AI, privacy has become a societal concern; regulations that primarily address individual data rights are inadequate.

See also  Bank of America Suffers Massive Data Breach, Exposing Social Security Numbers, Addresses and Additional Sensitive Data To Hackers

Beyond static data, it is imperative that dynamic conversational prompts be treated as IP to be protected and safeguarded. If you are a consumer, engaged in co-creating an artifact with a model, you want your prompts that direct this creative activity not to be used to train the model or otherwise shared with other consumers of the model.

If you are an employee working with a model to deliver business outcomes, your employer expects your prompts to be confidential; further, the prompts and the responses need a secure audit trail in the event of liability issues that surfaced by either party. This is primarily due to the stochastic nature of these models and the variability in their responses over time.

What happens next?

We are dealing with a different kind of technology, unlike any we have seen before in the history of computing, a technology that exhibits emergent, latent behavior at scale; yesterday’s approaches for security, privacy, and confidentiality do not work anymore.

The industry leaders are throwing caution to the winds, leaving regulators and policymakers with no alternative but to step in.

Happened privacy Security
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

What Is a Seed Phrase in Crypto? A Beginner’s Guide to Wallet Security

2025-12-05

What Is a Private Key in Crypto? A Beginner’s Guide to Wallet Security

2025-12-03

What Is a Hardware Wallet? A Beginner’s Guide to Crypto Security

2025-11-27

🧠 Bitcoin’s Sharpe Ratio Hits ZERO — The Last Time This Happened = ??? 🔍📊

2025-11-25
Add A Comment

Leave A Reply Cancel Reply

Top Posts
Scams

US Government Slams Sam Bankman-Fried’s Lawyers for Proposed Questions to Court Jurors

2023-09-17

The US Government is countering the attorneys of former FTX chief executive Sam Bankman-Fried, saying…

Altcoins

Ripple Transfers $132 Million XRP Tokens Amid XRP Price Dip

2023-09-13

Ripple Labs, led by CEO Brad Garlinghouse, has transferred totaling 132 million XRP in the…

Videos

Bitcoin Investors Brace For These MAJOR Events

2025-01-23

Today, let’s look at the latest news, charts, and metrics on Bitcoin and Crypto. Today…

Subscribe to Updates

Get the latest news and Update from CINN about Crypto, Metaverse and NFT.

Editors Picks

🚀 SpaceX vs Tesla Share War Begins! ⚡️FSD Solved + Datacenter Shockwave! 🔥

2025-12-11

Who really controls Bitcoin’s price? 🤔

2025-12-11

This Is Worse Than I Thought…

2025-12-11

Bitcoin’s Next HUGE Move After Fed Decision

2025-12-11
Crypto Investor News Network
Facebook Twitter Instagram TikTok
  • Contact
  • Terms & Conditions
  • Privacy Policy
  • DMCA
  • Disclouser
© 2025 - All rights are reserved.

Type above and press Enter to search. Press Esc to cancel.

bitcoin
Bitcoin (BTC) $ 0.00000000000000
ethereum
Ethereum (ETH) $ 0.00000000000000
tether
Tether (USDT) $ 0.00000000000000
xrp
XRP (XRP) $ 0.00000000000000
bnb
BNB (BNB) $ 0.00000000000000
usd-coin
USDC (USDC) $ 0.00000000000000
staked-ether
Lido Staked Ether (STETH) $ 0.00000000000000
tron
TRON (TRX) $ 0.00000000000000
dogecoin
Dogecoin (DOGE) $ 0.00000000000000
cardano
Cardano (ADA) $ 0.00000000000000