minus-squareDecaturNature@yall.theatl.socialtoPrivacy@lemmy.ml•Anamorphic encryption against dictators - hiding message inside normal looking ciphertextlinkfedilinkEnglisharrow-up4·13 days agoInteresting. One potential difficulty in implementation would be the creation of a believable decoy conversation (for the dictator to read) – but LLMs might be able to automate this. linkfedilink
DecaturNature@yall.theatl.social to Privacy@lemmy.mlEnglish · edit-22 months agoNeural Privacy: EFF interviews Yuste and Genser of the Neurorights Foundationplus-squaremessage-squaremessage-square0fedilinkarrow-up124
arrow-up124message-squareNeural Privacy: EFF interviews Yuste and Genser of the Neurorights Foundationplus-squareDecaturNature@yall.theatl.social to Privacy@lemmy.mlEnglish · edit-22 months agomessage-square0fedilink
Interesting. One potential difficulty in implementation would be the creation of a believable decoy conversation (for the dictator to read) – but LLMs might be able to automate this.