minus-squareDecaturNature@yall.theatl.socialtoPrivacy@lemmy.ml•Anamorphic encryption against dictators - hiding message inside normal looking ciphertextlinkfedilinkEnglisharrow-up4·1 day agoInteresting. One potential difficulty in implementation would be the creation of a believable decoy conversation (for the dictator to read) – but LLMs might be able to automate this. linkfedilink
DecaturNature@yall.theatl.social to Privacy@lemmy.mlEnglish · edit-22 months agoNeural Privacy: EFF interviews Yuste and Genser of the Neurorights Foundationplus-squaremessage-squaremessage-square0fedilinkarrow-up124arrow-down10
arrow-up124arrow-down1message-squareNeural Privacy: EFF interviews Yuste and Genser of the Neurorights Foundationplus-squareDecaturNature@yall.theatl.social to Privacy@lemmy.mlEnglish · edit-22 months agomessage-square0fedilink
DecaturNature@yall.theatl.social to Memes@lemmy.mlEnglish · 1 year agoGlory!yall.theatl.socialimagemessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1imageGlory!yall.theatl.socialDecaturNature@yall.theatl.social to Memes@lemmy.mlEnglish · 1 year agomessage-square0fedilink
Interesting. One potential difficulty in implementation would be the creation of a believable decoy conversation (for the dictator to read) – but LLMs might be able to automate this.