June 2026
Intermediate
392 pages
11h 24m
English
How might you defend against the attacks you just learned about? Consider the example from the previous chapter, in which my frenemy tried to compromise Khryseai’s ability to identify high-quality wine. To protect Khryseai from manipulation, we could try to isolate her from harm physically (by locking her in a room) or technically (by cutting off her network, API, or cloud connections), limiting an attacker’s access to her. We could also show her examples of poisoned data so that she understands what kind of information she should ignore. Lastly, we could equip her with automatic processes that alert her ...
Read now
Unlock full access