🔴 NEW: Breaking LLMs: How Data Poisoning Attacks Work

Data poisoning lets attackers corrupt your AI model before it ever reaches your servers. Learn how backdoor attacks work, real 2024 incidents, and how to defend your training pipeline.

0:00 Intro
0:0

https://www.youtube.com/watch?v=LfJZxc8S6fA

#AISecurity #DataPoisoning #LLMAttacks #MachineLearningSecurity #Cybersecurity2024 #datapoisoningattackLLM #AIbackdoorattack #machinelearningsecurity

Breaking LLMs: How Data Poisoning Attacks Work

YouTube

I've used Fawkes, which is a tool which poisons any image's data, and obfuscates everything that might be in an image by adding extra pixels and shifting a few to different directions.

The final result is something that's completely different from the original, but barely is noticeable to the human eye. - and a win for privacy.

So even if you have #nobot in your bio, you can be a bit more assured that your face won't be trained for any AI system.

#fawkes #facialrecognition #datapoisoning

Une étude publiée le 15 avril 2026 dans la revue Nature révèle un phénomène aussi fascinant qu’inquiétant : des modèles d’IA peuvent se transmettre des biais, des préférences — voire des comportements problématiques — à travers des données qui n’en contiennent aucune trace visible.

https://www.numerama.com/tech/2233755-une-ia-est-tombee-amoureuse-des-hiboux-sans-jamais-avoir-lu-le-mot-hibou.html

Concrètement ? Ça veut dire que le #DataPoisoning est une porte d'entrée quasiment invisible pour de la manipulation d'#IA. Bref, c'est l'enfer.

Une IA est tombée amoureuse des hiboux sans jamais avoir lu le mot « hibou »

Une étude publiée le 15 avril 2026 dans la revue Nature révèle un phénomène aussi fascinant qu’inquiétant : des modèles d’IA peuvent se transmettre des biais, des préférences -- voire des comportements problématiques -- à travers des données qui n’en contiennent aucune trace visible. De plus en plus de modèles de

Numerama
To promote human creativity and fight the theft of said creations by AI I absolutely support #datapoisoning in all forms.

RE: https://mastodon.social/@eff/116274356726829741

As well as an attack on children's right to self-determination. Stop trying to "Protect the children" and leave them the fuck alone.

Not that this has anything to do with protecting kids. The is plausible deniability for increasing the surveillance state while allowing them to continue to criticize China for theirs.

It is very likely we aren't going to be able to stop this. What we need to do at this point is educate those willing to learn and make sure they get as little and as incorrect data as we can. Teach your kids how to bypass this shit, and teach everyone who cares what data poisoning is.

#BigBrother #NannyState #DataPoisoning #Falsify #BlindThePanopticon #TheKidsAreAlright #LeaveTheKidsAlone

NEW BIML Bibliography entry

https://arxiv.org/abs/2503.03150

Position: Model Collapse Does Not Mean What You Think

Rylan Schaeffer, Joshua Kazdan, Alvan Caleb Arulandu, Sanmi Koyejo

We think recursive pollution is a better term than model collapse. Weak terminology leads to misunderstanding of impact. See figure 4. This is a very good paper.

#TOPPAPER #MLsec #RecursivePollution #DataPoisoning

https://berryvilleiml.com/references/

History teaches us the FBI is pretty good tracing people running manual DDoS attacks. To actually pull this off without getting busted, you'd need some angry engineers

There are plenty right now. With Google forcing mandatory verification and closing AOSP, many open-source devs feel cornered. They'd be the perfect candidates to slip a 'Trojan horse' right into their apps on the stores, maybe hidden inside a compromised open-source library. Devs could claim they just 'imported a library' without knowing it was poisoned

It's a supply chain attack: plausible deniability for the coders too. Users would just be 'victims' of malware, so no one gets arrested and age check and chat control will be unusable

I'm not an engineer though, so maybe I'm missing something. Just a thought for more elevated minds..

#SupplyChainAttack #CyberResistance #TrojanHorse #DDosTrojanHorse #DataPoisoning #STASI #ChatControl #AgeCheck #Privacy #DDos
#DigitalDisobedience #KGB #VirusTrojanHorse #DDosTrojanHorse

I see people thinking Linux or GrapheneOS will bypass chat control or age check. As seen with Ubuntu&CA's AB 1043, laws target OS providers. An "illegal" OS won't work: apps and browsers will demand the mandatory age signal, or the OS itself might block access to avoid fines. VPNs? Useless when USA, EU, and Canada etc enforce agechecks globally
If this madness passes, let's fight back and turn every device into a weapon of digital disobedience. Imagine an 'outlaw' OS mod appending a 'payload of forbidden words' (hidden in metadata) to every message
If millions sent these 'poisoned' messages, Chat Control would collapse under false positives
Risk: Could they brick our phones? Yes. But if millions get blocked simultaneously? Instant economic blackout. It's Mutually Assured Destruction: they can't ban everyone.
If everything is suspicious, nothing is

They scan for pedophiles but ignore #EpsteinFiles

#DataPoisoning #ChatControl #AgeCheck #Privacy #DDos #DigitalDisobedience #STASI #KGB

@catsalad

I've got an alternative idea if this madness actually goes through and we can't find a solution to circumvent it legally or not....

Instead of just running, let's turn every single phone into a weapon of digital disobedience.Imagine if an 'outlaw' OS (or a simple mod) automatically appended a 'bag of forbidden words' to every message, hidden in metadata or invisible text, containing a random mix of terms guaranteed to trigger the system.
If millions of people sent billions of these 'poisoned' messages, Chat Control would collapse under the sheer weight of false positives. It would be the biggest DDoS attack in history, powered purely by civil disobedience......

If everything is suspicious, nothing is.

#DDoS #FalsePositives #DataPoisoning #ChatContol #AgeVerification #AgeCheck