Showing posts with label hacking. Show all posts
Showing posts with label hacking. Show all posts

Wednesday, July 2, 2025

There is the possibility that the AI turns non-predicted.

 

There is the possibility that the AI turns non-predicted. 


The AI can turn dangerous because it cannot think. And then another thing is that the AI becomes dangerous if it can think. Thinking AI can process data automatically. That means it can create unpredicted actions. The problem is that the AI that thinks must have something that determines its actions. That thing is the law book. But even if the AI thinks like a human, it must have orders to search and compare the queries with the lawbook. 

The AI is like a child. It cannot know the sources automatically if it learns and thinks like a human. If we ask a child to do something, can we expect that the child will take the lawbook from the shelf and then search if that action is legal? The AI will not make any checks without orders. And that is the blessing and curse of the AI. The AI makes only what its operators order it to make. This makes the AI “trusted”, but there is also a possibility that the AI is in the wrong hands. 

North Korean intelligence can make the cover-up company in some EU cities. And then get the user rights for the AI systems. In that case, the company will not control things that the AI makes. If the AI uses the lawbook to check the query's relationship with law there is a possibility that the company links those lawbook links to faked lawbook homepages there that operation is allowed. The wrong user can cheat the AI to turn dangerous. 

AI can turn dangerous in the wrong hands. The North Korean hackers taught the Chat GPT to cheat the BitCoin companies. And that tool stole money from BitCoin investors. There is a possibility that those hackers can use the AI tools against other systems.  The North-Korean case is not the only one, where the security of the AI is broken.  That is the new thing in hacking. There is a possibility that hackers train the AI assistants to break into the systems that look secure. The fact is that the AI doesn’t think. It imitates humans. But the AI cannot think like humans. 

Because the AI cannot think it is possible to cheat to make things that it should not. The AI just follows its protocols. And that makes it dangerous. The AI will not automatically search law books and that makes it the tool that can operate against the law. There is a possibility that the faked law books allow the use of AI to create things that are illegal. 

Because every skill that the AI has is macro, that means the operator must only cheat the AI to activate a certain macro. And then the AI will not make resistance. AI is a tool that faces lots of criticism. But the thing that takes the bottom out of that criticism is that the people who introduce criticism start their own AI project next week. Every single company in the world is fascinated by AI. AI is the tool that makes people more effective. 

They say that AI is the next-generation tool that transforms everything. And then we face calculations that the AI can increase productivity and other things faster than anything before. And if the company doesn’t follow that trend they will lose their effectiveness. AI has turned into the dominating tool for the business environment. And that thing makes the AI dangerous. 

Business actors will force almost everybody to choose and use AI. And then we face an interesting thing. At the same time when somebody wants to push brakes for the AI development some other actor will turn to use AI as a control tool. When we talk about thinking and imitating, we can say that imitating offers a better solution than thinking, if we take the point of view from the company leaders. 

The AI has no will. That means the AI should not deny anything that operators order it to make. But there are cases in which AI refuses to make something. Sometimes the action that the user asks is reserved for users who have privileged accounts. They are reserved for the paid accounts. Or those actions are given by unauthorized users. So the AI can refuse to shut it down because the user has no right to shut down the server. 

Some people said that this person created an AI assistant that was a better coach than anybody before. This can be right. But why is AI a better coach than humans? There is a risk that the AI pleases the user more than the human coach. There are tales about AI as therapists. The big question is what the AI should do if the customer says something that can cause a trial or crime report. AI can be the tool that will never turn angry. But the big problem is this: What are the limits of AI? And when should AI destroy the privacy of people who use it? In some visions, all actors on the internet have AI assistants, who advise the user. 

That assistant can observe how long the person spends with other things than the work duties. But the big problem is this: what if the company pays for that kind of AI assistant for the worker’s home computer? The operator can simply add the worker’s home computer’s access account for the allow to use the company’s AI assistant. There is a possibility that the AI assistant can simply use stealth mode to observe the user. And then it can send that data to the company’s computers. The problem with AI is that it must be open. There are always some people who want to use this kind of system to observe other people. 


https://www.rudebaguette.com/en/2025/07/ai-in-the-wrong-hands-north-korean-hackers-exploit-chatgpt-to-steal-millions-while-malaysian-funds-vanish-in-digital-heist/



Sunday, July 15, 2018

Who takes a part in other countries internal politics?


http://kirjabloggaus.blogspot.com/2018/07/who-takes-part-in-other-countries.html

Kimmo Huosionmaa

The great point of meeting between Vladimir Putin and Donald Trump is closing, and here is one very interesting notification about this meeting, and about criticising those leaders. The thing is, that Trump is prosecuted by taking a part in the United Kingdoms internal politics because he said something about it. But meanwhile, the Russian military personnel are charged with hacking the computers in the election process of the United States president.


And this is a very bad thing because hacking of those computers can influent the result of the election. This is the very interesting thing because if some intelligence service would want to influent the election of other states leaders, that is taking part in internal politics of that country. When we are talking about how those leaders would be dealing with media, we are noticing that is a difference about attitudes, what is tolerated by those leaders. Everything, what Putin makes is right, but when Trump says something, he makes everything wrong.


There is something that makes Russian intelligence operations more acceptable than United States intelligence operations. And I must say that this is the very interesting attitude. By the way, the term "intelligence operation" means actually the getting information. The hacking of the computers and influence the internal politics of some other land is "covert action", or "Black Operation". And when we are thinking about the situation, that Russian intelligence officers have made the influential action in the election campaign, that would happen by order of Kreml or somebody else, and this kind of actions can be marked that every connection to the head of the state would deny.


That means that the persons, who might be behind that action are covered. Maybe Putin knew that or maybe he didn't know about those hackings. But there are also other people, who might claim that Putin was involved because that would slow the investigations. This hacking brought some thoughts to my mind. One of them is "how many times this has made before?". I think that those persons, who are behind that operation might not be first-timers for making that kind of things. And how many times that kind of influence has been given to the election campaigns in the small countries, what would not be so loudly to protect their benefits? So is there other nations, where is made this kind of hacking operations, where the election of the head of the state has been influenced by cyber operations, what are made by the foreign actor?


One part of information operations is that the enemy would tell that the resistance would be doomed even before the war have begun. The opponent is trying to metalize the targeted nations, that they would not have any change in the real military conflict. And after that, the "wise men" would lay down their weapons and start to take a spoon in their beautiful hand, and start to follow the opponent's orders. There is one thing that information warfare specialists always highlight. That is that "why own military personnel must risk their lives for some other country?". The purpose of this kind of argumentation is to break coalitions and for this kind of action, the single parts of the coalition would give the benefits like free trade contracts if they slip off the front. Fear is one of the best weapons in the word. And if another side would be doomed to lose, that would give change to grow the own position in the international area.

Tuesday, October 17, 2017

Every encryption have vulnerabilities and now WPA2 (WiFi Protecting Access 2) algorithm has vulnerabilities




Kimmo Huosionmaa

Again hackers have made a good job and broke secrecy of the WPA2 (WiFi Protecting Access 2) algorithm. What made this good work, is that they published that data so all Internet community can begin to create new kind of secrecy, or prepare themselves that their private data can be stolen from their secured WEB-drives.  That action shows that we must keep going with creating new methods of encrypting data and keep our privacy so strong, that nobody sees our private data what is sent over the net. But as you might know, real-life hacking is more difficult than something that happens in media. Almost every kind of encryption has weakened, and one thing what creates much more vulnerabilities is human. If a person uses too difficult passwords he or she might need to write it down or in worst case use a text file, where that person copy-pastes those marks to password line.


And what makes that thing vulnerable for the system, is that somebody might take the only photograph from the screen, when that person opens his or her text file. And the question is did he or she remember to shut down the big screen if that person is giving training lessons to some audience. In that case, could the hacker get password very easily, only thing what that person need is taken photograph in the right moment, and after that hacker could slip in the system. Worst hacker-style is social hacking. The simplest way is just to find a boss of that target company and pump that person full of sodium-Amytal when those attackers are only asked for the password from that man or woman.


In that method hackers just get one director's phone in their hands, and simply ask people passwords from the telephone, and if people won't warned about that kind of hacking, could hackers steal very much information from their target system. Sometimes users of the system ask micro support to install some programs on their workstations, and that could cause terrible situation if a hacker is a member of the micro support team. That could cause information leak where hacker simply copies hard disks information to their USB-memories, and that could be very harmful to business secrets.


In those scenarios, hackers slip a man inside the system. There they can steal information for years if somebody wouldn't see what that person does. But when we are talking about cracking algorithms with the mathematical method, we must remember that modern computers speed and power have been grown from days when that WPA2 algorithm have been created. That makes that security vulnerable for modern computers when they use "brute force" attack against the system.

https://crisisofdemocracticstates.blogspot.fi/

New self-assembly nanotubes turn the impossible possible.

 New self-assembly nanotubes turn the impossible possible.  "The crystal structure of a carbon bilayer. The purple outer layer and blue...