Record summary
A quick snapshot of what this page covers.
Techniques4Attack methods connected to this risk.
Mitigations2Defenses that may help with related attacks.
Domain2. Privacy & SecurityThe broad risk area this belongs to.
Risk profile
How this risk is described and categorized.
Domain2. Privacy & Security
Subdomain2.1 > Compromise of privacy by leaking or correctly inferring sensitive information
Entity3 - Other
Intent3 - Other
Timing3 - Other
CategoryPersonal Loss and Identity Theft
Subcategoryn/a
Suggested mitigations
Defenses that may help with related attacks.
Use Ensemble Methods
ML Model Engineering
Code Signing
Deployment
Source
Research source for this risk, when available.
Included resource
GenAI against humanity: nefarious applications of generative artificial intelligence and large language models
Original source
MIT AI Risk Repository
Open the public repository used for AI risk records and taxonomy fields.
