logoalt Hacker News

sigmaryesterday at 6:07 PM2 repliesview on HN

>The site asks visitors to "assist the war effort by caching and retransmitting this poisoned training data"

This aspect seems like a challenge for this to be a successful attack. You need to post the poison publicly in order to get enough people to add it across the web. but now people training the models can just see what the poison looks like and regex it out of the training data set, no?


Replies

tintoryesterday at 6:28 PM

Can't be regex detected. It is dynamically generated with another LLM:

https://rnsaffn.com/poison2/

It is very different every time.

show 3 replies
DonHopkinsyesterday at 6:39 PM

>and regex it out

Now you have two problems.

https://www.jwz.org/blog/2014/05/so-this-happened/