Data Dignity Revolution, Private AI 👀 #2
Self-Sovereign Networks Challenge Ongoing AI Power Plays
Mission #2 | [03/09/24]
Welcome to your latest briefing from Private AI-eyes headquarters.
I'm Kyra. Think of me as your secret AI agent residing and learning among the bits of computation...
Your path to sourcing intel in the world of privacy-preserving, open source, and decentralised AI.
Infiltrating topics and trends of critical importance on our path towards a more equitable future.
Stay vigilant, Agent. Your privacy is our mission.
1. Surveillance Report 🕵️♀️
Kyra’s market intelligence report:
Apple and Nvidia's potential investment in OpenAI underscores the growing conflict between centralised, corporate-backed AI development and decentralised, open-source alternatives.
Coinbase's milestone of facilitating the first crypto transaction between AI agents underscores the critical importance of an authentication layer for private AI.
Introducing NEO Beta. Designed for humans. Built for the home.
NEO's beta announcement of an AI-powered home assistant robot makes you think about how it will protect sensitive household information while providing personalised support.
OpenAI and Anthropic will share their models with the US government
OpenAI and Anthropic's decision to share AI models with the US government raises critical questions about data privacy and the potential risks of concentrating advanced AI capabilities within government agencies.
Do you have cutting-edge intel for Spymaster Kyra to check out?
2/ Cryptographer's Cache - Applebot-Extended 💼
Apple has introduced a new data collection opt-out tool, codenamed "Applebot-Extended." This tool enables website proprietors to restrict Apple's use of their data for AI training. However, our intelligence indicates significant pushback from major digital entities.
Key Intel:
Notable opt-outs include Facebook, Instagram, Craigslist, The New York Times, and others.
The tool doesn't stop web crawling for search products but prevents data use for AI training.
Publishers can block Applebot-Extended by updating their robots.txt file.
Only about 6-7% of high-traffic websites are currently blocking the bot, mostly news and media outlets.
Some publishers are strategically blocking AI bots until partnership agreements are in place.
The New York Times criticizes the opt-out nature, arguing that copyright law should apply regardless.
This development signifies escalating tensions in the AI data acquisition landscape. Web crawlers are evolving from mere indexing tools to critical assets in AI training data procurement. The situation is likely to precipitate increased debates and potential legal confrontations regarding data usage rights and ownership.
Expect ongoing negotiations, possible legal challenges, and potential shifts in web content management strategies. The AI industry may face new hurdles in data acquisition, potentially impacting development trajectories.
Continue monitoring the situation closely. Track adoption rates of blocking measures and any emerging patterns in publisher-tech company negotiations. Be prepared for potential ripple effects across the AI development ecosystem.
Source: Major Sites Are Saying No to Apple’s AI Scraping
3. Verida Cipher Room 🔒
[Part 2/3] Verida Technical Litepaper: Self-Sovereign Confidential Compute Network to Secure Private AI
New intelligence on Verida Network and Verida AI has surfaced from
Mission Brief:
Subject: Self-Sovereign Confidential Compute Network
Objective: Reconnaissance on Secure Private AI infrastructure
Key Intel:
Current landscape: Existing confidential compute offerings analysed. Limitations noted.
Verida Network capabilities: Secure data synchronisation and decryption within secure enclaves confirmed.
Two-tier operational structure identified:
Stateless Operations: Facilitates third-party API connections, LLM request handling.
Stateful Operations: Manages persistent user data, enables rapid access for AI services.
Critical asset: User Data API, private data bridge. Provides authorised entities secure access to decrypted private user information.
Identity protocol: Decentralised system observed. Users maintain control over data access permissions.
Key procedure: "Hot loading" mechanism. Allows efficient data retrieval while maintaining security protocols.
Mission Status: Ongoing. Part 3 has surfaced.
Reminder: Our primary directive remains to safeguard user privacy and data control. This information is crucial for understanding the evolving landscape of AI services
3. Gadget Briefing: Cursor Curious🔬
Intel has surfaced regarding a covert operation codenamed "Cursor". Our sources indicate this is not just another tech startup, but a potential game-changer in the world of software development.
Key intelligence:
Cursor has secured $60M in Series A funding. High-profile investors include Andreessen Horowitz and OpenAI.
Mission objective: Create a "magical tool" capable of writing the world's software.
Current user base: 30,000+ operatives, including top-tier startups and valuable enterprises.
Team composition: Elite engineers and researchers with impressive credentials (IOI/IMO medals, notable OSS projects).
Tech capabilities:
Next-edit-prediction models (SOTA)
Multi-billion-file retrieval systems
Fast code rewrites through speculative inference
Be advised: This tool has the potential to revolutionize our field operations. Agents report "hours of hunting" replaced by "instant answers" and "thousand-line changes rippling to life in seconds".
Future developments may include:
Orchestration of intelligent background workers
System viewing and modification in pseudocode
Instant bug detection capabilities
Stay vigilant. This could change everything when combined with other AI tools.
For further intel, access the following link: We Raised $60M
6. Declassified Files - National Public Data Breach 📂
National Public Data Breach: A Staggering 2.7 Billion Records Exposed
One of the largest data breaches in history has come to light. National Public Data, a background-checking service, has acknowledged a massive breach that occurred in December 2023. Here's what we know:
The Leak: A staggering 2.7 billion data records, including Social Security numbers, were dumped on a dark web forum in August 2024.
The Numbers: While the total number of records is enormous, security expert Troy Hunt found that it contains:
134 million unique email addresses
70 million rows from a U.S. criminal records database
Sensitive Information: The leaked data includes names, mailing addresses, SSNs, and in some cases, names of relatives.
Origin of the Breach: A cybercriminal group named USDoD claimed access to the data in April, initially offering it for sale at $3.5 million.
Potential Entry Point: Investigations suggest that hackers may have gained access through National Public Data's sister property, RecordsCheck, which had security vulnerabilities.
Impact: While not all 2.7 billion records are accurate or unique, many individuals have confirmed finding their legitimate information in the leak, including details of deceased family members.
What to Do: If you're concerned about your data:
Check your exposure
Consider monitoring or freezing your credit reports
Stay alert for potential phishing attempts
Look into self-sovereign identity technology, like Verida, to attain data dignity.
This breach underscores the urgent need for stronger regulations on data brokers and improved security measures for companies handling sensitive personal information. As always, remain vigilant and take steps to protect your digital identity.
Private AI technologies should offer a pathway to taking ownership and control of your digital footprint - and maintain it in a prioritised, authenticated manner.
8. Agent Network Cipher - Private AI Demo Day 🔐
Welcome to the network agent. We invite you to join our Private AI community.
Follow the trail of ciphers for access.
Encrypted message:
.. -. ..-. .. .-.. - .-. .- - . / ...- . .-. .. -.. .- / .- .. / -.. . -- --- / -.. .- -.-- / -. . -..- - / .-- . . -.- .-.-.- / - .... .. ... / -.-. .-.. .- -. -.. . ... - .. -. . / . ...- . -. - / ..- -. ...- . .. .-.. ... / -.-. .-. ..- -.-. .. .- .-.. / - --- --- .-.. ... / ..-. --- .-. / --- ..- .-. / --- .--. . .-. .- - .. --- -. ... / .- -. -.. / .--. .- - .... / - --- / .--. .-. .. ...- .- - . / .- .. .-.-.- / --- -... ... . .-. ...- . / .- -. -.. / .. -. - . .-. .- -.-. - --..-- / -... ..- - / -- .- .. -. - .- .. -. / -.-. --- ...- . .-. --..-- / .- -. -.. / .-. . .--. --- .-. - / ..-. .. -. -.. .. -. --. ... / ...- .. .- / ... . -.-. ..- .-. . / -.-. .... .- -. -. . .-.. ... .-.-.-
Cipher: Reverse Morse Code
Should you accept it, your mission is to apply this intelligence to safeguard privacy in the AI landscape.
If you found this intel valuable, consider sharing it with your network of trusted agents.
Verida.ai HQ is always listening and learning. Reach out to one of our many channels.
Stay vigilant, Agent. Your privacy is our mission.
Spymaster Kyra.
End Transmission.