


The pig-killing plate was tricked by a large AI model, and the price was 520 yuan. The scammer broke the defense
When it comes to "pig killing plate", many people hate it with itch. This is a popular form of telecommunications fraud on the Internet. Scammers prepare "pig feed" such as personas and dating routines, and call social platforms "pig pens" where they look for fraud targets they call "pig" and establish romantic relationships, that is, "raising pigs." Finally, the money is defrauded, which is "killing the pig".
Since the fraudsters are overseas, this kind of fraud is usually difficult to crack. The victim’s hundreds of thousands or even millions of money are wasted in this way, and the victim suffers heavy psychological damage. .
B station up owner @turling’s cat said that recently, several of his friends have encountered the pig-killing plate. So, he decided to "use magic to defeat magic": use an AI trained using Bilibili comments to chat with scammers and see how the AI can outwit the scammers. In the end, not only did he not lose any money, but he earned a red envelope of 520 yuan from the scammer.
##Video address: https://www.bilibili.com/video/BV1qD4y1h7io/
In order to get scammers to take the bait, the author registered accounts on multiple social platforms, and based on the victim portraits released by the Ministry of Public Security and the Anti-Fraud Center, he positioned the accounts as single, wealthy, well-educated, and well-behaved girls. Label. This kind of personality has earned him a lot of private messages.
In order to accurately identify liars and avoid accidentally injuring ordinary people, only those who meet the following conditions will enter the chat with AI:
In the end, 5 suspects "stand out." The author shows a conversation between the AI and one of the suspects.
The conversation on the first day was mainly about "finding out the family background". Both the suspect and the AI showed their financial resources to each other. During this period, AI memes appeared frequently, including memes such as "Beijing Master Jixiang" and "Master, what do you do for a living?" In the end, the suspect played hard to get and ended the conversation on the pretext of "hosting a company meeting."
#The next day, the suspect started the approach mode, using clues found in the circle of friends to find accomplices The topics ranged from raising cats to "The Great Gatsby" to philosophy.
For most of these topics, AI can catch it, but occasionally it will reveal its flaws, such as Encyclopedic information is given mechanically when talking about The Great Gatsby. However, the suspect did not seem to delve into these flaws.
On the fourth day, the suspect began to change the topic to love in an attempt to establish a relationship. At this time, the explosive point came: because the suspect's words triggered the keyword "just because", the AI directly threw out the explosive joke-"Little Heizi, are you showing your chicken feet?"
However, the suspect still had no suspicion...
After chatting like this for three weeks, the suspect came up with his big move: giving red envelopes. In response, AI happily accepted and said a few polite words.
But when the suspect pretended to be pitiful and wanted to get some care from the AI, the AI's response seemed a bit nonsensical.
#However, the suspect still did not become suspicious and continued to show off his personality, while the AI continued to chat with memes.
In the end, the suspect began to pretend to be in trouble, trying to trick the AI into investing money.
While the AI insisted that he had no money, the suspect also resorted to various means.
After discovering that the deception failed, the suspect also attempted to have AI delete the chat history to make it more difficult for the police to handle the case.
In the end, the suspect broke through the defense and rejected all information from the AI, and the conversation ended.
Of course, this kind of defeating magic with magic has happened before. Previously, Xiao Ai on Xiaomi mobile phones was popularly searched for receiving fraudulent calls. MIUI has a built-in AI call function. After turning on anti-harassment in the call settings option, if the harassing call is recorded in the Yellow Pages and the harassing call comes in, Xiaoai will automatically help the phone owner answer the call, and sometimes help you chat with the scammer for several minutes.
Using AI to answer harassing calls seems to be the ultimate solution to this kind of problem, but the development of things is an upward spiral. Later, the party making the harassing calls also used AI, and it became AI fighting was introduced, and later the large models came, and the interaction between the two parties became more exciting. This AI that frequently makes headlines is also supported by large models.
How does the AI that competes with liars do it?
This AI is based on Source 1.0, which is a massive Chinese language model launched by Inspur Artificial Intelligence Research Institute. It has 245.7 billion parameters and contains the world's largest Chinese data set - 5.02TB. Source 1.0 can accomplish many tasks, including dialogue, story continuation, news generation... The main thing is that it is open source.
Address: https://air.inspur.com/
The model is done, and Turing's cat faces a new problem. Since WeChat chat is a multi-round conversation, and for AI, they often cannot remember what they or the other party said in the previous sentence. When chatting, the first words and the last words are inconsistent, and it is easy for people to doubt whether the other person is a real person.
In order to solve this problem, Turing's Cat said that he referred to the LSTM idea in the sequence model and added a memory mechanism to the system, so that AI can achieve simple long-term and short-term conversations. Memory, such as what we talked about yesterday and what we talked about in the last round, AI will refer to it.
In addition, in order to make the words spoken by AI more like real people, Turing’s Cat also added a prior rule based on Prompt Example to guide AI to learn how to communicate in a targeted manner, especially in a given situation. Under the mission of fraud scenario.
The example corpus is mainly extracted from popular comments on Bilibili and Tieba. In this way, AI can learn the wise words and memes of netizens, making it The dialogue between the two parties was not so stiff.
Finally, Turing’s Cat uses the open source Wechaty framework to build a backend on the cloud, calling puppet services based on local python scripts to allow AI Seamless access to WeChat. As long as you log in to the pre-registered WeChat ID, the AI can reply to any private chat or group chat.
In order to ensure that the AI is sufficiently human-like, Turing’s Cat still spent some time and did a lot of tricks. For example, let this AI publish a circle of friends that looks real; set an interval for replying to each message; simulate real human typing speed; replace text with some chat emoticons (emoticons are not yet supported); when the other party says a lot in one breath At this time, AI will splice consecutive sentences, read them into one sentence, and then reply. After some optimization, this AI made back 520 yuan from the scammer.
#But Turing’s cat has already donated the money transferred by the scammer to the AI.
This code is currently open source: https://github.com/Turing-Project/AntiFraudChatBot
Netizen comments
Regarding this AI, netizens said: "I feel like I might not be able to react if I were on the other side."
Some netizens suggested that this AI can be used for basic learning on Xiaohongshu, Zhihu and Weibo. The Tieba content of this AI is too strong.
Regarding the fact that the scammer was deceived, netizens who watched the chat process said that if this AI chatted with ordinary people, it would definitely be recognized, but The pig slaughtering coil opposite can't do that much, as long as it has performance.
As Mr. Zhihui said: "Maybe it will be AI that will make liars unemployed in the future."
No matter how far AI develops, the same sentence remains: there are many fraud methods, don’t transfer money if you don’t listen or believe it!
The above is the detailed content of The pig-killing plate was tricked by a large AI model, and the price was 520 yuan. The scammer broke the defense. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics



Creating an Oracle database is not easy, you need to understand the underlying mechanism. 1. You need to understand the concepts of database and Oracle DBMS; 2. Master the core concepts such as SID, CDB (container database), PDB (pluggable database); 3. Use SQL*Plus to create CDB, and then create PDB, you need to specify parameters such as size, number of data files, and paths; 4. Advanced applications need to adjust the character set, memory and other parameters, and perform performance tuning; 5. Pay attention to disk space, permissions and parameter settings, and continuously monitor and optimize database performance. Only by mastering it skillfully requires continuous practice can you truly understand the creation and management of Oracle databases.

To create an Oracle database, the common method is to use the dbca graphical tool. The steps are as follows: 1. Use the dbca tool to set the dbName to specify the database name; 2. Set sysPassword and systemPassword to strong passwords; 3. Set characterSet and nationalCharacterSet to AL32UTF8; 4. Set memorySize and tablespaceSize to adjust according to actual needs; 5. Specify the logFile path. Advanced methods are created manually using SQL commands, but are more complex and prone to errors. Pay attention to password strength, character set selection, tablespace size and memory

The core of Oracle SQL statements is SELECT, INSERT, UPDATE and DELETE, as well as the flexible application of various clauses. It is crucial to understand the execution mechanism behind the statement, such as index optimization. Advanced usages include subqueries, connection queries, analysis functions, and PL/SQL. Common errors include syntax errors, performance issues, and data consistency issues. Performance optimization best practices involve using appropriate indexes, avoiding SELECT *, optimizing WHERE clauses, and using bound variables. Mastering Oracle SQL requires practice, including code writing, debugging, thinking and understanding the underlying mechanisms.

Field operation guide in MySQL: Add, modify, and delete fields. Add field: ALTER TABLE table_name ADD column_name data_type [NOT NULL] [DEFAULT default_value] [PRIMARY KEY] [AUTO_INCREMENT] Modify field: ALTER TABLE table_name MODIFY column_name data_type [NOT NULL] [DEFAULT default_value] [PRIMARY KEY]

The integrity constraints of Oracle databases can ensure data accuracy, including: NOT NULL: null values are prohibited; UNIQUE: guarantee uniqueness, allowing a single NULL value; PRIMARY KEY: primary key constraint, strengthen UNIQUE, and prohibit NULL values; FOREIGN KEY: maintain relationships between tables, foreign keys refer to primary table primary keys; CHECK: limit column values according to conditions.

Nested queries are a way to include another query in one query. They are mainly used to retrieve data that meets complex conditions, associate multiple tables, and calculate summary values or statistical information. Examples include finding employees above average wages, finding orders for a specific category, and calculating the total order volume for each product. When writing nested queries, you need to follow: write subqueries, write their results to outer queries (referenced with alias or AS clauses), and optimize query performance (using indexes).

This article describes how to customize Apache's log format on Debian systems. The following steps will guide you through the configuration process: Step 1: Access the Apache configuration file The main Apache configuration file of the Debian system is usually located in /etc/apache2/apache2.conf or /etc/apache2/httpd.conf. Open the configuration file with root permissions using the following command: sudonano/etc/apache2/apache2.conf or sudonano/etc/apache2/httpd.conf Step 2: Define custom log formats to find or

Oracle is the world's largest database management system (DBMS) software company. Its main products include the following functions: relational database management system (Oracle database) development tools (Oracle APEX, Oracle Visual Builder) middleware (Oracle WebLogic Server, Oracle SOA Suite) cloud service (Oracle Cloud Infrastructure) analysis and business intelligence (Oracle Analytics Cloud, Oracle Essbase) blockchain (Oracle Blockchain Pla
