{"guid":"33e55662-41b7-4e37-ac80-2f3a5c4b27a6","title":"The Security and Privacy Implications of AI and Machine Learning","subtitle":null,"slug":"SHA2017-323-the_security_and_privacy_implications_of_ai_and_machine_learning","link":"https://c3voc.de","description":"What will the recent rapid progress in machine learning and AI mean for the fields of computer security and privacy? This talk gives a tour of some answers, and some unanswered questions. It will discuss new types of attacks and surveillance that are becoming possible due with modern neural networks, and some new research problems that the computer security community should be working on.\n\n#MachineLearning #Privacy","original_language":"eng","persons":["Peter Eckersley"],"tags":["SHA2017","323"],"view_count":372,"promoted":false,"date":"2017-08-05T00:00:00.000+02:00","release_date":"2017-08-05T02:00:00.000+02:00","updated_at":"2026-02-24T11:30:09.019+01:00","length":3896,"duration":3896,"thumb_url":"https://static.media.ccc.de/media/events/SHA2017/323-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/SHA2017/323-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/SHA2017/33e55662-41b7-4e37-ac80-2f3a5c4b27a6-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/SHA2017/33e55662-41b7-4e37-ac80-2f3a5c4b27a6-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/SHA2017-323-the_security_and_privacy_implications_of_ai_and_machine_learning","url":"https://api.media.ccc.de/public/events/33e55662-41b7-4e37-ac80-2f3a5c4b27a6","conference_title":"SHA2017: Still Hacking Anyway","conference_url":"https://api.media.ccc.de/public/conferences/SHA2017","related":[{"event_id":4230,"event_guid":"2764cdfd-49ab-4463-a809-198dec7abdf6","weight":6},{"event_id":4234,"event_guid":"f471ff12-1889-41c8-b65e-787b87c460db","weight":6},{"event_id":4235,"event_guid":"e914d37b-16a4-4529-890d-654a4b22b054","weight":6},{"event_id":4238,"event_guid":"9ea86f2f-b236-431f-9027-8b31c0b2ad56","weight":7},{"event_id":4240,"event_guid":"dec63dd2-d66b-419d-863d-c20fd5ce91dd","weight":12},{"event_id":4249,"event_guid":"98f8267c-cad1-4d04-8a52-f7e979e68c00","weight":6},{"event_id":4258,"event_guid":"ce7ba341-f44e-4f82-9f67-45e2df6b9c67","weight":7},{"event_id":4261,"event_guid":"3852e448-f6cf-4bfe-8b14-12d590075bd6","weight":11},{"event_id":4286,"event_guid":"30b059d7-2809-4fd2-83b8-5e445acdf4ca","weight":8},{"event_id":4300,"event_guid":"d48d1713-333b-4515-b56d-bc12fa2d3c44","weight":6},{"event_id":4306,"event_guid":"8db39cdd-7700-4123-a22d-22393e282154","weight":6},{"event_id":4347,"event_guid":"24112c59-8a55-40ca-a30f-d42a4850a9c6","weight":10},{"event_id":4350,"event_guid":"2308618a-a879-470a-ac61-8d163c0b431c","weight":7},{"event_id":4361,"event_guid":"54fd6dc6-c0c7-46d5-b122-4b94ec8ba635","weight":6},{"event_id":4821,"event_guid":"aed02b65-9a16-4a42-ac28-2883da680d0a","weight":7}],"recordings":[{"size":467,"length":3896,"mime_type":"video/mp4","language":"eng","filename":"SHA2017-323-eng-The_Security_and_Privacy_Implications_of_AI_and_Machine_Learning_hd.mp4","state":"new","folder":"h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2017-08-05T14:29:45.495+02:00","recording_url":"https://cdn.media.ccc.de/events/SHA2017/h264-hd/SHA2017-323-eng-The_Security_and_Privacy_Implications_of_AI_and_Machine_Learning_hd.mp4","url":"https://api.media.ccc.de/public/recordings/17512","event_url":"https://api.media.ccc.de/public/events/33e55662-41b7-4e37-ac80-2f3a5c4b27a6","conference_url":"https://api.media.ccc.de/public/conferences/SHA2017"},{"size":44,"length":3881,"mime_type":"audio/opus","language":"eng","filename":"SHA2017-323-eng-The_Security_and_Privacy_Implications_of_AI_and_Machine_Learning.opus","state":"new","folder":"opus","high_quality":false,"width":0,"height":0,"updated_at":"2017-08-05T15:26:06.855+02:00","recording_url":"https://cdn.media.ccc.de/events/SHA2017/opus/SHA2017-323-eng-The_Security_and_Privacy_Implications_of_AI_and_Machine_Learning.opus","url":"https://api.media.ccc.de/public/recordings/17520","event_url":"https://api.media.ccc.de/public/events/33e55662-41b7-4e37-ac80-2f3a5c4b27a6","conference_url":"https://api.media.ccc.de/public/conferences/SHA2017"},{"size":59,"length":3881,"mime_type":"audio/mpeg","language":"eng","filename":"SHA2017-323-eng-The_Security_and_Privacy_Implications_of_AI_and_Machine_Learning.mp3","state":"new","folder":"mp3","high_quality":false,"width":0,"height":0,"updated_at":"2017-08-05T15:28:17.634+02:00","recording_url":"https://cdn.media.ccc.de/events/SHA2017/mp3/SHA2017-323-eng-The_Security_and_Privacy_Implications_of_AI_and_Machine_Learning.mp3","url":"https://api.media.ccc.de/public/recordings/17523","event_url":"https://api.media.ccc.de/public/events/33e55662-41b7-4e37-ac80-2f3a5c4b27a6","conference_url":"https://api.media.ccc.de/public/conferences/SHA2017"},{"size":139,"length":3896,"mime_type":"video/mp4","language":"eng","filename":"SHA2017-323-eng-The_Security_and_Privacy_Implications_of_AI_and_Machine_Learning_sd.mp4","state":"new","folder":"h264-sd","high_quality":false,"width":720,"height":576,"updated_at":"2017-08-05T15:53:00.605+02:00","recording_url":"https://cdn.media.ccc.de/events/SHA2017/h264-sd/SHA2017-323-eng-The_Security_and_Privacy_Implications_of_AI_and_Machine_Learning_sd.mp4","url":"https://api.media.ccc.de/public/recordings/17527","event_url":"https://api.media.ccc.de/public/events/33e55662-41b7-4e37-ac80-2f3a5c4b27a6","conference_url":"https://api.media.ccc.de/public/conferences/SHA2017"},{"size":177,"length":3896,"mime_type":"video/webm","language":"eng","filename":"SHA2017-323-eng-The_Security_and_Privacy_Implications_of_AI_and_Machine_Learning_webm-sd.webm","state":"new","folder":"webm-sd","high_quality":false,"width":720,"height":576,"updated_at":"2017-08-05T15:54:46.150+02:00","recording_url":"https://cdn.media.ccc.de/events/SHA2017/webm-sd/SHA2017-323-eng-The_Security_and_Privacy_Implications_of_AI_and_Machine_Learning_webm-sd.webm","url":"https://api.media.ccc.de/public/recordings/17530","event_url":"https://api.media.ccc.de/public/events/33e55662-41b7-4e37-ac80-2f3a5c4b27a6","conference_url":"https://api.media.ccc.de/public/conferences/SHA2017"},{"size":534,"length":3896,"mime_type":"video/webm","language":"eng","filename":"SHA2017-323-eng-The_Security_and_Privacy_Implications_of_AI_and_Machine_Learning_webm-hd.webm","state":"new","folder":"webm-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2017-08-05T19:13:18.126+02:00","recording_url":"https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-323-eng-The_Security_and_Privacy_Implications_of_AI_and_Machine_Learning_webm-hd.webm","url":"https://api.media.ccc.de/public/recordings/17567","event_url":"https://api.media.ccc.de/public/events/33e55662-41b7-4e37-ac80-2f3a5c4b27a6","conference_url":"https://api.media.ccc.de/public/conferences/SHA2017"}]}