Breaking 21:15 OpenAI robotics chief resigns over concerns about Pentagon partnership 21:00 US and Japan consider $13 billion Japan Display factory as part of major investment plan 20:15 Venezuela’s Rodriguez calls for dialogue with the United States 16:00 United States begins using British bases for operations against Iran 15:15 UAE hit by new drone and missile strikes despite Iranian apologies 14:15 Oil prices soar after eight days of Middle East conflict 13:20 Pro Russian disinformation exploits turmoil around the Epstein case 12:30 Trump warns Iran could face severe military response 12:00 Colombian president calls on Trump to distance himself from Netanyahu 11:50 Fed signals possible rate hikes as oil shock rattles global markets 11:20 Interstellar comet 3I/ATLAS found rich in methanol, ALMA observations show 09:50 Anthropic fights US ‘national security risk’ label as Amodei apologizes for leaked Trump memo 09:20 French quantum startup Pasqal raises €340 million and targets dual Paris–Nasdaq listing 08:50 Behind Trump’s clash with Anthropic, military AI moves into the war room 08:20 OpenAI scrambles to repair damage after rushed US military deal backlash 07:50 AI in warfare: why military decision-making is the most critical risk 07:20 Wall Street shifts strategy as US Iran conflict rattles global markets 07:00 Nasa dart impact changed asteroid orbit around the sun, study finds 22:29 Boeing CEO Kelly Ortberg earns $9.4 million in 2025 amid executive compensation scrutiny

Artificial Intelligence: The Enigmatic Foe of Your Privacy

Friday 07 June 2024 - 13:00
Artificial Intelligence: The Enigmatic Foe of Your Privacy

In the realm of technological advancements, the rise of artificial intelligence (AI) unveils a captivating panorama of possibilities. However, this sophisticated technology harbors an unsettling potential to gravely compromise the confidentiality of personal data.

AI and machine learning have transformed a myriad of domains, spanning computing, finance, medical research, automatic translation, and more, expanding with each passing month. Yet, these strides are accompanied by a recurring inquiry: what is the impact of these technologies on our privacy and data confidentiality? Regardless of the AI model in question, their development is fueled by ingesting an astronomical quantity of data, some of which could be highly sensitive.

The Retention of Secrets by AI

One of the principal challenges faced by enterprises training artificial intelligences lies in the inherent capacity of these technologies to learn and memorize intricate patterns derived from their training data. This characteristic, while advantageous for enhancing model accuracy (preventing hallucinations, for instance), poses a significant risk to privacy.

Machine learning models, comprising algorithms or systems that enable AI to learn from data, can encompass billions of parameters, akin to GPT-3 with its staggering 175 billion parameters. These models leverage this vast expanse of data to minimize prediction errors. Therein lies the crux of the issue: during the process of adjusting their parameters, they may inadvertently retain specific information, including sensitive data.

For illustration, if models are trained on medical or genomic data, they could memorize private information that could be extracted through targeted queries, thereby jeopardizing the confidentiality of the individuals concerned. Envision a scenario where a cyberattack or an accidental data breach occurs within the organization possessing these models; malicious entities could potentially disclose this sensitive information.

AI and the Prediction of Sensitive Information

AI models can also harness seemingly innocuous data to deduce sensitive information. A striking example is that of the Target retail chain, which successfully predicted pregnancies by analyzing customers' purchasing habits. By cross-referencing data such as the purchase of dietary supplements or unscented lotions, the model could identify potentially pregnant customers and target them with specific advertisements. This case demonstrates that even mundane data can unveil highly personal aspects of one's privacy.

Despite efforts to limit data memorization, most current methods have proven ineffective. However, there is one technique presently considered the most promising for ensuring a degree of confidentiality during model training: differential privacy. But as you will see, it is far from miraculous.

Differential Privacy: An Imperfect Solution?

To explain differential privacy in simple terms, consider this example: imagine participating in a survey, but you disagree with someone being aware of your participation or responses. Differential privacy introduces a small amount of "noise" or randomness into the survey data, so that even if someone accesses the results, they cannot be certain of your specific responses. It anonymizes the data while allowing for analysis without compromising your privacy.

This method has been adopted by industry titans like Apple and Google. However, even with this protection, AI models can still draw conclusions or make predictions about personal or private information. To prevent such violations, the only solution is to protect the entire dataset transmitted to the organization, an approach known as local differential privacy.

Despite its advantages, differential privacy is not without its limitations. Its primary drawback is that it can induce a significant decrease in the performance of machine learning methods. Consequently, models may be less accurate, providing erroneous information, and are much slower and costlier to train.

Therefore, a compromise must be struck between achieving satisfactory results and providing sufficient protection for individuals' privacy. A delicate balance must be found and, more importantly, maintained as the AI sector continues to expand. While AI can assist you in your daily life, whether for professional, personal, or academic purposes, do not consider it an ally of your confidentiality, far from it.

In summary, AI models can retain sensitive information during training, and even innocuous data can lead them to draw conclusions that compromise privacy. The differential privacy method is employed to limit this phenomenon, but it is far from perfect.


  • Fajr
  • Sunrise
  • Dhuhr
  • Asr
  • Maghrib
  • Isha

Read more

This website, walaw.press, uses cookies to provide you with a good browsing experience and to continuously improve our services. By continuing to browse this site, you agree to the use of these cookies.