Imagine that can be done to get social security numbers, credit card numbers, people’s private information like addresses, phone numbers, emails, etc.

  • nightlily@leminal.space
    link
    fedilink
    English
    arrow-up
    2
    ·
    20 hours ago

    Since everyone apparently missed the point of the article, the interesting part isn’t the keys, it’s the bypassing of the guardrails.

  • hexagonwin@lemmy.sdf.org
    link
    fedilink
    arrow-up
    4
    ·
    1 day ago

    doesn’t seem that big of a deal. these are kms client activation keys, you can even find them on official microsoft pages. all public information. even if they weren’t one could say search engines have the exact same problem and even argue LLMs make these private info harder to believe/obfuscated.

    • ddh@lemmy.sdf.org
      link
      fedilink
      English
      arrow-up
      3
      ·
      1 day ago

      The important point is that they can regurgitate specific strings they have ingested. Personal information they have sucked up could just as easily still be in there.

  • rebelsimile@sh.itjust.works
    link
    fedilink
    arrow-up
    1
    ·
    1 day ago

    I’m trying so many angles to tell people how mundane shit like this is, let me try one more:

    it’s not interesting that an LLM can pull back something anyone can find in a google search result if they took more than 2 minutes. Stop writing articles about this shit.

  • Kyrgizion@lemmy.world
    link
    fedilink
    arrow-up
    1
    ·
    1 day ago

    I thought they somehow managed to trick it into revealing the keys of the systems it was running on, but these are just random kms keys from forums.

    Still neat how they use tags to obfuscate the filtered keywords. Gonna have to remember that one.