CONTACT US
info@bidaiondo.com

Users' private conversations with ChatGPT are encrypted. And despite this, hackers are reading them

     ChatGPT conversations are encrypted, but they do not prevent this type of attack from being carried out

     Google's conversational chatbot, Gemini, is not reached because it uses a different architecture

ChatGPT has become part of the lives of millions of people who use it daily for different tasks ranging from preparing for job interviews to summarizing meetings. But how exposed are your conversations? We have known for some time that OpenAI can use chat content to improve its AI models, unless chat history is disabled or the paid version of ChatGPT Enterprise is used.

The above means that some employees of the company led by Sam Altman have the possibility of accessing your conversations for technical or security purposes. This is why it is so important not to share confidential information, but rather to tell Samsung that it ended up prohibiting the use of ChatGPT among its employees. Beyond this, there are other ways in which conversations can end up in the hands of a third party, for example, a cybercriminal.
The cyberattack that compromises the security of ChatGPT

Imagine that you are in a cafe using ChatGPT from your laptop connected to the public Wi-Fi network. This scenario could be favorable for an attacker to use certain elements within their reach to try to deduce the chatbot's responses. All this, without you realizing it. The information about the attack that we will explain below comes from an interesting study by the Offensive AI Research Laboratory at Ben-Gurion University in Israel that is basically developed in four steps:


     Intercept the victim's traffic
     Filter packets to find ChatGPT responses
     Reveal token length
     Infer ChatGPT response using an LLM

If you are a ChatGPT user, you will surely have noticed that the chatbot progressively sends you the response. We can also explain this process in the following way: the model, GPT-3.5 or GPT-4, transmits the tokens to your computer as it generates them. Now, although this sequential transmission is encrypted, it opens the door to using a type of attack known as Side-channel attack that can reveal the length of the tokens to infer information.

The attacker's challenge at this point is to intercept the data sent between the OpenAI servers and your computer, something that can be achieved with a Man-in-the-Middle attack. Once the malicious actor has compromised network security, they will filter traffic by IP address and analyze packets to detect an incremental pattern in order to discover packets related to ChatGPT responses.

You can then identify the length of the tokens using the packet sizes observed earlier. Here, precisely, the highest level of difficulty occurs: since a token can represent a unit of text as short as a character or as long as a set of words, it is necessary to resort to an additional solution to interpret them and infer the answers. The researchers' solution has been to use an LLM for this task.

We are talking about a specially trained long language model that is capable of analyzing the length of the tokens and predicting the responses generated by ChatGPT quite accurately. The results may vary, but in the tests the model was able to infer 55% of all responses with high precision (the words may change slightly, but the meaning of the sentence slightly). Furthermore, 29% of them had perfect accuracy.

Although this is an attack that requires certain sophisticated elements to execute, it never hurts to keep in mind the extent to which our data can end up being exposed. It should be noted that this technique, according to the researchers, not only works with ChatGPT, but also with other artificial intelligence bots such as Copilot that send the tokens sequentially. Google's Gemini is not reached, precisely because it has a different architecture.

Last news

base_url:
host: www.bidaiondo.com
REQUEST_URI: /noticias/las-conversaciones-privadas-de-los-usuarios-con-chatgpt-estan-encriptadas-y-pese-a-ello-los-hackers-las-estan-leyendo
path: /news/all-about-the-influencer-law-a-temporary-patch-or-a-lasting-measure
All about the Influencer Law: a "temporary patch" or a lasting measure?
The government of Spain approved the Influencers Law with the aim of regulating the activity of content creators on social networks and protecting consumers from covert or harmful advertising. This regulation will apply to all content creators who ha...
base_url:
host: www.bidaiondo.com
REQUEST_URI: /noticias/las-conversaciones-privadas-de-los-usuarios-con-chatgpt-estan-encriptadas-y-pese-a-ello-los-hackers-las-estan-leyendo
path: /noticias/apple-ya-pronuncia-inteligencia-artificial-asoma-como-una-estrategia-post-iphone-que-llegara-con-socios
Apple already pronounces 'Artificial Intelligence'. It appears as a post-iPhone strategy that will arrive with partners
WWDC 2023, Apple's event for its developers in which it revealed the Vision Pro, left a curiosity: the company did not once utter 'Artificial Intelligence' despite it being the technological hype train. In the quarterly results that he...

online trading systems.

We show you the best way to market products and services online, through a professional service of installation, management and maintenance of your virtual store

We program to suit you

We help you achieve operational excellence in all your business processes, whether they are production, logistics, service or office processes. In addition, we assure you to maintain continuous improvement in your management.

Bidaiondo Articles

Quishing: what it is, how it works and how to avoid and protect yourself from this type of cyber scam

We are going to explain to you what quishing is, a type of scam similar to phishing, but which is based on deceiving you using QR codes. This is a scam in which they pass off a code as legitimate, and take you to a website where they can steal your data. We are going to explain this article by explaining what exactly quishing is, and its main characteristics. This will make you able to identify it and differentiate it from other types of scam,...

Ver más »

Phishing emails are the source of 90% of attacks on companies

Email is one of the main technological innovations that has revolutionized the way we understand the world, as well as reconfigured the business model. Since its invention in 1965, the evolution of this means of communication has been transgressive, and according to data from Statista, there were already more than 4.26 billion users using email in 2022 and the number of emails sent on that same date amounted to 330,000 million, with a growth fore...

Ver más »