AI Assistants, Apart From Google Gemini, Are Spilling Your Secrets

Source: Ars Technica AI Assistants, Apart From Google Gemini, Are Spilling Your Secrets

Passively Purloining Private Packets

AI assistants have been in the news lately, and not in a way that the designers hoped.  If the Morris 2 self replicating AI worm wasn’t enough to make you question their use, perhaps realizing that people can read the supposedly encrypted responses to your queries might give you pause.  The man in the middle attack is ridiculously easy to accomplish and is both relatively effective and completely undetectable.  The queries you send can be observed by anyone on the same network that you communicate with the AI assistant on, it doesn’t require any malware to be installed or credentials to be acquired or faked.  The problem is that the encryption used is flawed, and an LLM can be trained to decrypt the AI assistants responses to your questions; Google’s Gemini is the only exception.

The researchers who discovered the flaw were able to determine the topic you are asking about over 50% of the time and could extract the entirety of the message 29% of the time.  Since the attack only requires someone to observe your traffic, there is no way to know if your queries are being eavesdropped on.  To make things even worse, the LLM trained to decrypt the traffic will probably only get more accurate as it gets more training data.

Ars Technica delves into the specifics of the attacks, or you could ask your AI assistant if you dare.

With the exception of Google Gemini, all widely available chat-based LLMs transmit tokens immediately after generating them, in large part because the models are slow and the providers don't want users to wait until the entire message has been generated before sending any text. This real-time design plays a key role in creating the side channel.

Video News

About The Author

Jeremy Hellstrom

Call it K7M.com, AMDMB.com, or PC Perspective, Jeremy has been hanging out and then working with the gang here for years. Apart from the front page you might find him on the BOINC Forums or possibly the Fraggin' Frogs if he has the time.

Leave a reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Latest Podcasts

Archive & Timeline

Previous 12 months
Explore: All The Years!