Is it time to start worrying about AI hackers?
AI attacks will first determine the target, then obtain feedback, and continuously optimize and improve. If one day AI can develop completely novel solutions or even begin to optimize solutions, its lethality will be huge.
System ambiguity is the current barrier against AI hackers
For games like Go, the rules, goals, and feedback are all simple and certain. , there is nothing external to disrupt the situation, losing or winning is feedback. GPT-3 AI can write coherent articles because the world it lives in is only text. Because of this, many current hacker reward activities are conducted in simulated environments, all artificial, all constrained, and all rules are prepared for AI.
The fuzziness of the system is the key. We can input all global tax laws into AI, because there are formulas in tax laws to determine how much tax is owed. Even so, all laws have ambiguities. Blur is difficult to translate into code and tricky for AI to handle. So even with AI, there will still be a need for a lot of tax lawyers in the foreseeable future.
Most human systems are more ambiguous. Could AI be used to hack real-world sports games (such as hockey games)? I'm afraid it's difficult. The AI must understand the rules of the game, but that's not enough. It also needs to understand human physiology, the aerodynamics of clubs and balls, and more. Of course we can't say it's absolutely impossible, but it's definitely much harder than dealing with Go.
In the short term, it is precisely because social systems are extremely complex and ambiguous that the system’s defense against AI hackers is enhanced. It is unlikely that AI sports hackers will appear in the future. If robots participate in games in person, or one day in the future AI is so advanced that it can understand the vast world from all dimensions, then there may be AI sports hackers born.
Similarly, casino AI hackers and legal process AI hackers are not easy to develop. It will take a long time for AI to simulate the work of individuals or groups, and it is not possible for the time being.
But don’t underestimate the non-linear evolution capability of AI
The world is full of AI hackers. This is a science fiction problem, but it is not a stupid science fiction problem. AI is improving rapidly, but its progress is unstable and incoherent. Problems we thought were difficult may turn out to be easy, and problems we thought were easy may turn out to be difficult. A few decades ago we might have laughed at AI and thought it would be impossible for it to conquer Go because Go was too complex: not that the rules were complex, but that there were too many possible moves. What now? AI has already won Go.
So, we should think about the problem of AI hackers in advance and prepare plans early.
First of all, what we should pay attention to may be AI hackers in the financial system, because the rules of the financial system are easily exploited by algorithms. High frequency trading algorithms are a good example and will become more complex in the future. We can arm AI with real-time global financial information, add global laws and regulations, add news information, and add other relevant information, and then assign AI to complete a goal, pursuing "maximum legal profit" or "obtaining the largest possible profit". profit". At that time, there may be some hacking behaviors that are beyond human understanding, which means that humans will not even realize that hacking behaviors have occurred. Of course, such a thing seems a bit far away now.
In the short term, AI may cooperate with humans to complete hacking attacks. AI can find loopholes, and experienced accountants or tax lawyers can collaborate and use their rich experience to determine whether loopholes can be exploited for profit.
The lethality of mature AI hackers is immeasurable
Throughout human history, hacker attacks are generally human behaviors. If AI starts attacking, everything will change. AI will not be limited to certain methods and will not be subject to many restrictions like humans. AI doesn't rest at all, they think like aliens, and it can hack systems in ways humans can't predict.
Computers enhance attacks in four dimensions: speed, scale, scope and complexity. AI can increase attack power many times.
Speed: It may take months or even years for humans to launch an attack, but AI does not need to. It may take days, hours or even seconds. For example, what would happen if you fed the entire U.S. tax code into an AI and told it to find a plan to minimize someone's tax bill? If it is a multinational company, AI may be used to analyze global tax laws and reduce taxes for the company.
Scale: Once the AI finds a vulnerability, it may exploit it at an extremely large scale. When AI begins to break into the financial system, they will dominate the entire industry. At that time, credit markets, tax laws, and general laws may all tilt in favor of the rich. AI will worsen inequality. The first AI financial hackers may not be developed by researchers pursuing equality, but by multinational banks, hedge funds, and management consultants.
Scope: Society does have a plan to deal with hackers, but it mainly deals with human hackers and attacks at human speed. If AI can quickly find hundreds of loopholes in tax laws, how can the country cope with it? The speed of amending tax laws simply cannot keep up.
Complexity: With the assistance of AI, human hackers can launch complex attacks whose complexity exceeds the level of unassisted human understanding. AI’s sophisticated statistical analysis can reveal relationships between variables and find hidden vulnerabilities that even the best strategists and experts may not be aware of.
When AI launches attacks at ultra-fast speed, ultra-large scale, ultra-wide scope, and ultra-high complexity, society may not be able to handle it at all. Will AI break through human limitations and even dominate society? Some AI researchers are indeed worried. Although it sounds like speculation now, early prevention is still necessary for humans. (Xiao Ge)
The above is the detailed content of Is it time to start worrying about AI hackers?. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics



In Debian systems, readdir system calls are used to read directory contents. If its performance is not good, try the following optimization strategy: Simplify the number of directory files: Split large directories into multiple small directories as much as possible, reducing the number of items processed per readdir call. Enable directory content caching: build a cache mechanism, update the cache regularly or when directory content changes, and reduce frequent calls to readdir. Memory caches (such as Memcached or Redis) or local caches (such as files or databases) can be considered. Adopt efficient data structure: If you implement directory traversal by yourself, select more efficient data structures (such as hash tables instead of linear search) to store and access directory information

In Debian systems, the readdir function is used to read directory contents, but the order in which it returns is not predefined. To sort files in a directory, you need to read all files first, and then sort them using the qsort function. The following code demonstrates how to sort directory files using readdir and qsort in Debian system: #include#include#include#include#include//Custom comparison function, used for qsortintcompare(constvoid*a,constvoid*b){returnstrcmp(*(

This article describes how to adjust the logging level of the ApacheWeb server in the Debian system. By modifying the configuration file, you can control the verbose level of log information recorded by Apache. Method 1: Modify the main configuration file to locate the configuration file: The configuration file of Apache2.x is usually located in the /etc/apache2/ directory. The file name may be apache2.conf or httpd.conf, depending on your installation method. Edit configuration file: Open configuration file with root permissions using a text editor (such as nano): sudonano/etc/apache2/apache2.conf

In Debian systems, OpenSSL is an important library for encryption, decryption and certificate management. To prevent a man-in-the-middle attack (MITM), the following measures can be taken: Use HTTPS: Ensure that all network requests use the HTTPS protocol instead of HTTP. HTTPS uses TLS (Transport Layer Security Protocol) to encrypt communication data to ensure that the data is not stolen or tampered during transmission. Verify server certificate: Manually verify the server certificate on the client to ensure it is trustworthy. The server can be manually verified through the delegate method of URLSession

The steps to install an SSL certificate on the Debian mail server are as follows: 1. Install the OpenSSL toolkit First, make sure that the OpenSSL toolkit is already installed on your system. If not installed, you can use the following command to install: sudoapt-getupdatesudoapt-getinstallopenssl2. Generate private key and certificate request Next, use OpenSSL to generate a 2048-bit RSA private key and a certificate request (CSR): openss

The readdir function in the Debian system is a system call used to read directory contents and is often used in C programming. This article will explain how to integrate readdir with other tools to enhance its functionality. Method 1: Combining C language program and pipeline First, write a C program to call the readdir function and output the result: #include#include#include#includeintmain(intargc,char*argv[]){DIR*dir;structdirent*entry;if(argc!=2){

Configuring a Debian mail server's firewall is an important step in ensuring server security. The following are several commonly used firewall configuration methods, including the use of iptables and firewalld. Use iptables to configure firewall to install iptables (if not already installed): sudoapt-getupdatesudoapt-getinstalliptablesView current iptables rules: sudoiptables-L configuration

This guide will guide you to learn how to use Syslog in Debian systems. Syslog is a key service in Linux systems for logging system and application log messages. It helps administrators monitor and analyze system activity to quickly identify and resolve problems. 1. Basic knowledge of Syslog The core functions of Syslog include: centrally collecting and managing log messages; supporting multiple log output formats and target locations (such as files or networks); providing real-time log viewing and filtering functions. 2. Install and configure Syslog (using Rsyslog) The Debian system uses Rsyslog by default. You can install it with the following command: sudoaptupdatesud
