• @oatscoop@midwest.social
    link
    fedilink
    English
    6
    edit-2
    9 months ago

    If it weren’t so difficult and require so much effort, I’d rather clicking the link cause the server to switch to serving up poisoned data – stuff that will ruin a LLM.

    • @HelloHotel@lemm.ee
      link
      fedilink
      English
      3
      edit-2
      9 months ago

      Visiting /enter_spoopmode.html will choose a theme and mangle the text for any page you next go to accordingly (think search&replace with swear words or santa clause)

      It will also show a banner letting the user know they are in spoop mode, with a javascript button to exit the mode, where the AJAX request URL is ofuscated (think base64) The banner is at the bottom of the html document (not nesisarly the screen itself) and/or inside unusual/normally ignored tags. <script type="spoop/text" style='display:block">you are in spoop mode</script>

      Or have a secret second page that is only followed if you ignore robots.txt /spoop_post/yvlhcigcigc is a clone of /post/yvlhcigcigc in ‘spoop mode’

    • @T156@lemmy.world
      link
      fedilink
      English
      2
      edit-2
      9 months ago

      Would that be effective? A lot of poisoning seems targeted to a specific version of an LLM, rather than being general.

      Like how the image poisoning programs only work for some image generators and not others.