Skip to main content

CHATGPT IS CHANGING. SHOULD WE BE AFRAID? - CHATGPT BERUBAH. APAKAH KITA TAKUT?

 CHATGPT IS CHANGING. SHOULD WE BE AFRAID?  -  CHATGPT BERUBAH. APAKAH KITA TAKUT?

ChatGPT is entering a new phase in its development as OpenAI has announced the upcoming integration of plug-ins for ChatGPT to allow calling services that complement its capabilities.

The idea is to eventually open a shop of plug-ins that can be installed directly from its interface and to allow the use of plug-ins in applications where ChatGPT has been integrated.

For the moment, the experimentation is done in a restricted circle, with priority given to developers and ChatGPT Plus users.

The code of the plug-in is open source so whoever wants to use it has to deploy its own instance and register it on ChatGPT. But only developers are allowed to do this.

However, one can legitimately ask if, by using third party services and allowing the use of plug-ins, OpenAI is not endangering the security of its Chatbot and especially that of all those who use it for their professional activity?

Third party intervention:

As soon as you allow a third party to intervene, either in the design of a product or in its use, you lose absolute control over that product and open a hole in its security.

On Line File Sharing

So when you use external online file sharing services, you can't know if the servers are sufficiently protected. Also, doesn't Google Drive announce that it has a right of review over everything that passes through its services?

It is not a secret that File sharing can enable bad actors to install or bundle viruses, worms, spyware, Trojan Horses or other malicious code into files.

Everyone remembers the data breach after phishing attack that Dropbox suffered in November 2022 when a threat actor stole 130 private GitHub code repositories.

VPN

Similarly, how often do we hear about VPNs that are infected and infect the installations of those who use VPNs whose servers are not sufficiently protected?

Many of the VPNs offered on the market contain malware such as Trojans, adware, risky programs or spyware.

CLOUD

Also, the Cloud, which is also a service, offered by a third party, is a source of many problems regarding the security of the data entrusted to it.

A cloud is vulnerable either because the password chosen by its administrator is weak, or because it contains a flaw or is poorly configured, or because it is not sufficiently protected.

Hackers would need only 30 minutes to locate a vulnerable cloud and hack it (01net, 26 November 2021).

As long as ChatGPT remains in a closed circuit and only feeds itself with data from its own resources, ChatGPT will be secure. This will no longer be the case once it uses third parties, and those using ChatGPT risk having their installations infected.

Plug-ins are not without danger:

All plug-ins or add-ons can without exception be used as an attack vector and cause major security problems in any computer system, ranging from the loss of control of the device to the loss of data and the introduction of viruses, malware or even backdoors.

CONCLUSION:

The idea of expanding the possibilities and applications of the ChatGPT is great in itself but it carries great dangers and it is up to those who use this chatbot to be aware of this and to protect themselves against any possible contamination or attacks from this chatbot.

The best protection is the one offered by ARCHANGEL 2.0 which scans and inspects in depth what is about to penetrate your network before it penetrates and blocks what is suspicious.

None of the protection systems created by PT SYDECO involve a third party at any stage of their development or use. This is the case with the VPN and the Online File Sharing System, SydeCloud, whose servers are protected by ARCHANGEL,

And don't forget to take advantage of the exceptional offer to protect your company, your installations by ordering your protection system before April 30th 2023.

Aucun texte alternatif pour cette image

 

 

CHATGPT BERUBAH. APAKAH KITA TAKUT?

ChatGPT memasuki fase baru dalam pengembangannya karena OpenAI telah mengumumkan integrasi plugin yang akan datang untuk ChatGPT untuk memungkinkan layanan panggilan yang melengkapi kemampuannya.

Idenya adalah untuk akhirnya membuka toko plug-in yang dapat diinstal langsung dari antarmukanya dan memungkinkan penggunaan plug-in di aplikasi tempat ChatGPT telah terintegrasi.

Untuk saat ini, eksperimen dilakukan di kalangan terbatas, dengan prioritas diberikan kepada pengembang dan pengguna ChatGPT Plus.

Kode plug-in adalah open source jadi siapa pun yang ingin menggunakannya harus menerapkan instance-nya sendiri dan mendaftarkannya di ChatGPT. Tetapi hanya pengembang yang diizinkan melakukan ini.

Namun, seseorang dapat secara sah bertanya apakah, dengan menggunakan layanan pihak ketiga dan mengizinkan penggunaan plug-in, OpenAI tidak membahayakan keamanan Chatbot-nya dan terutama keamanan semua orang yang menggunakannya untuk aktivitas profesional mereka?

Intervensi pihak ketiga:

Segera setelah Anda mengizinkan pihak ketiga untuk campur tangan, baik dalam desain produk atau dalam penggunaannya, Anda kehilangan kendali mutlak atas produk tersebut dan membuka lubang dalam keamanannya.

Berbagi File On Line

Jadi ketika Anda menggunakan layanan berbagi file online eksternal, Anda tidak dapat mengetahui apakah server cukup terlindungi. Selain itu, bukankah Google Drive mengumumkan bahwa ia berhak meninjau segala sesuatu yang melewati layanannya?

Bukan rahasia lagi bahwa Berbagi file dapat memungkinkan aktor jahat untuk menginstal atau membundel virus, worm, spyware, Trojan Horses, atau kode jahat lainnya ke dalam file

Semua orang ingat pelanggaran data setelah serangan phishing yang diderita Dropbox pada November 2022 ketika pelaku ancaman mencuri 130 repositori kode GitHub pribadi.

VPN

Demikian pula, seberapa sering kita mendengar tentang VPN yang terinfeksi dan menginfeksi instalasi mereka yang menggunakan VPN yang servernya tidak cukup terlindungi?

Banyak VPN yang ditawarkan di pasaran mengandung malware seperti Trojan, adware, program berisiko, atau spyware.

CLOUD

Selain itu, Cloud yang juga merupakan layanan yang ditawarkan oleh pihak ketiga menjadi sumber banyak masalah terkait keamanan data yang dipercayakan kepadanya.

Cloud rentan karena kata sandi yang dipilih oleh administratornya lemah, atau karena mengandung cacat atau konfigurasi yang buruk, atau karena tidak cukup terlindungi.

Peretas hanya membutuhkan waktu 30 menit untuk menemukan cloud yang rentan dan meretasnya (01net, 26 November 2021).

Selama ChatGPT tetap berada dalam sirkuit tertutup dan hanya mengisi data dari sumbernya sendiri, ChatGPT akan aman. Ini tidak akan terjadi lagi setelah menggunakan pihak ketiga, dan mereka yang menggunakan ChatGPT berisiko menginstalnya terinfeksi.

Plug-in bukan tanpa bahaya:

Semua plug-in atau add-on tanpa kecuali dapat digunakan sebagai vektor serangan dan menyebabkan masalah keamanan utama di sistem komputer mana pun, mulai dari hilangnya kendali perangkat hingga hilangnya data dan masuknya virus, malware, atau bahkan pintu belakang.

KESIMPULAN:

Gagasan untuk memperluas kemungkinan dan aplikasi ChatGPT itu sendiri bagus tetapi membawa bahaya besar dan terserah mereka yang menggunakan chatbot ini untuk menyadari hal ini dan melindungi diri mereka dari kemungkinan kontaminasi atau serangan dari chatbot ini.

Perlindungan terbaik adalah yang ditawarkan oleh ARCHANGEL 2.0 yang memindai dan memeriksa secara mendalam apa yang akan menembus jaringan Anda sebelum menembus dan memblokir apa yang mencurigakan.

Tak satu pun dari sistem proteksi yang dibuat oleh PT SYDECO melibatkan pihak ketiga pada setiap tahap pengembangan atau penggunaannya. Ini adalah kasus VPN dan Sistem Berbagi Berkas Online, SydeCloud, yang servernya dilindungi oleh ARCHANGEL,

Dan jangan lupa untuk memanfaatkan penawaran luar biasa untuk melindungi perusahaan Anda, instalasi Anda dengan memesan sistem perlindungan Anda sebelum 30 April 2023.

#ChatGPT #Chatbot #Cybersecurity #Plug-in #VPN #Cloud #Archangel #PTSYDECO


Comments

Popular posts from this blog

QUIZZ

The 3 first ones who will give the right answers to the 10 following questions will win a Personal Firewall ARCHANGEL© PICCOLO   1.       What is the relation between the 3 background photos that are on the profile page of Mr. Patrick HOUYOUX President-Director of PT SYDECO? 2.        How many devices does the Firewall of Next Generation ARCHANGEL© 2.0 series SA1470 protect and how many secure tunnels does it create? 3.       What is the price of a one-year licence that a user of ARCHANGEL© PICCOLO will have to pay to continue protecting his or her IT installations from the second year onwards? 4.       What are the three programs which are housed in a single server that enable PT SYDECO's Integrated Protection System, to protect data at all times? 5.       Can PICCOLO protect a Smartphone? 6.       When (D/M/Y) did PT SYDECO signed a MOU with the Faculty of Engineering of University Gadjah Mada Yogyakarta? 7.    What are the three main features that make SydeCloud©, PT SYDECO'

A lesson in cyber safety

In an article published on 19 June 2023 in globalsecuritymag.fr/, Benoit Grunemwald, cybersecurity expert at ESET France, recounts the cyberattack suffered by REDDIT, an American social news aggregation, content rating, and discussion website, in February of the same year, and draws some lessons from it. This article follows the hackers' attempts, last repeated on 16 June, to obtain a ransom of 4.5 million dollars in order to delete the 80 GB of data stolen from the company, to which the company did not respond. The data was not encrypted, so the company did not lose it. However, the same cannot be said for its reputation.  Benoit Grunemwald explains that " It all started with a phishing email to harvest employee account data. All it takes is for a single employee to be trapped for cyber criminals to gain access to internal documents, software code, employee data , etc." He goes on to stress the " need to integrate in-depth security methods and resources, such as zer

IDS – IPS – DPI – FIREWALL

Understanding Key Elements of Cyber Defense Against Attacks  In the realm of network security, Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), Deep Packet Inspection (DPI), and Firewalls are vital concepts, each with distinct roles, functions, and purposes. This study delves into these components, their capabilities, and the significance of their integration in a holistic cybersecurity strategy. The landscape of cybersecurity hinges on the interplay of IDS, IPS, DPI, and Firewalls, each addressing different facets of network protection. This study elucidates their core functions, while emphasizing their symbiotic relationship within an efficient defense system. This while keeping in mind that the capabilities that will be described are those that each of the components should ideally have but whose effectiveness actually depends on the functions they are equipped with, the quality with which these functions have been created and the level of excellence with which