{"id":155043,"date":"2023-01-10T02:24:38","date_gmt":"2023-01-10T08:24:38","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2023\/01\/information-fabricated"},"modified":"2023-01-10T02:24:38","modified_gmt":"2023-01-10T08:24:38","slug":"information-fabricated","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2023\/01\/information-fabricated","title":{"rendered":"Information Fabricated"},"content":{"rendered":"<p><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/information-fabricated2.jpg\"><\/a><\/p>\n<p>This post is also available in: <a href=\"https:\/\/i-hls.com\/he\/archives\/110842\" class=\"\"><img decoding=\"async\" style=\"display:inline; margin: 0;\" class=\"\" src=\"https:\/\/i-hls.com\/wp-content\/plugins\/sitepress-multilingual-cms\/res\/flags\/he.png\" alt=\"he\" title=\"\u05e2\u05d1\u05e8\u05d9\u05ea\"> \u05e2\u05d1\u05e8\u05d9\u05ea (Hebrew)<\/a><\/p>\n<p>Hackers constantly improve at penetrating cyber defenses to steal valuable documents. So some researchers propose using an artificial-intelligence algorithm to hopelessly confuse them, once they break-in, by hiding the real deal amid a mountain of convincing fakes. The algorithm, called Word Embedding\u2013based Fake Online Repository Generation Engine (WE-FORGE), generates decoys of patents under development. But someday it could \u201ccreate a lot of fake versions of every document that a company feels it needs to guard,\u201d says its developer, Dartmouth College cybersecurity researcher V. S. Subrahmanian.<\/p>\n<p>If hackers were after, say, the formula for a new drug, they would have to find the relevant needle in a haystack of fakes. This could mean checking each formula in detail\u2014and perhaps investing in a few dead-end recipes. \u201cThe name of the game here is, \u2018Make it harder,\u2019\u201d Subrahmanian explains. \u201c\u2018Inflict pain on those stealing from you.\u2019\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This post is also available in: \u05e2\u05d1\u05e8\u05d9\u05ea (Hebrew) Hackers constantly improve at penetrating cyber defenses to steal valuable documents. So some researchers propose using an artificial-intelligence algorithm to hopelessly confuse them, once they break-in, by hiding the real deal amid a mountain of convincing fakes. The algorithm, called Word Embedding\u2013based Fake Online Repository Generation Engine [\u2026]<\/p>\n","protected":false},"author":662,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11,34,41,6],"tags":[],"class_list":["post-155043","post","type-post","status-publish","format-standard","hentry","category-biotech-medical","category-cybercrime-malcode","category-information-science","category-robotics-ai"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/155043","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/662"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=155043"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/155043\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=155043"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=155043"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=155043"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}