{"id":5639,"date":"2025-11-02T19:41:17","date_gmt":"2025-11-02T12:41:17","guid":{"rendered":"https:\/\/chongluadao.vn\/blog\/?p=5639"},"modified":"2025-11-27T02:43:32","modified_gmt":"2025-11-26T19:43:32","slug":"su-bung-no-cua-ai-lam-gia-tang-nguy-co-ro-ri-du-lieu-ca-nhan","status":"publish","type":"post","link":"https:\/\/chongluadao.vn\/blog\/en\/2025\/11\/su-bung-no-cua-ai-lam-gia-tang-nguy-co-ro-ri-du-lieu-ca-nhan\/","title":{"rendered":"The explosion of AI increases the risk of personal data leaks"},"content":{"rendered":"<p>The rapid development of artificial intelligence in recent years has opened up a series of conveniences for life, work and entertainment. However, it also comes with potential risks regarding data security that most users do not realize. As AI infiltrates every online activity \u2014 from work, study to entertainment \u2014 personal data is being collected, exploited and abused at an unprecedented rate.<\/p>\n\n\n\n<p>Here are the main reasons why AI becomes a \u201ccatalyst\u201d that increases the risk of personal data leaks:<\/p>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading5639_186702-84, .wp-block-kadence-advancedheading.kt-adv-heading5639_186702-84[data-kb-block=\"kb-adv-heading5639_186702-84\"]{font-size:var(--global-kb-font-size-md, 1.25rem);font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading5639_186702-84[data-kb-block=\"kb-adv-heading5639_186702-84\"]{display:flex;gap:0.25em;align-items:center;}.wp-block-kadence-advancedheading.kt-adv-heading5639_186702-84[data-kb-block=\"kb-adv-heading5639_186702-84\"] .kb-adv-heading-icon svg{width:1em;height:1em;}.wp-block-kadence-advancedheading.kt-adv-heading5639_186702-84[data-kb-block=\"kb-adv-heading5639_186702-84\"] .kb-adv-heading-icon{color:#fd7e14;}.wp-block-kadence-advancedheading.kt-adv-heading5639_186702-84[data-kb-block=\"kb-adv-heading5639_186702-84\"]:hover .kb-adv-heading-icon{color:#fd7e14;}.wp-block-kadence-advancedheading.kt-adv-heading5639_186702-84 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading5639_186702-84[data-kb-block=\"kb-adv-heading5639_186702-84\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading5639_186702-84 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading5639_186702-84[data-kb-block=\"kb-adv-heading5639_186702-84\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style><h2 class=\"kt-adv-heading5639_186702-84 wp-block-kadence-advancedheading kt-adv-heading-has-icon\" data-kb-block=\"kb-adv-heading5639_186702-84\"><span class=\"kb-svg-icon-wrap kb-adv-heading-icon kb-svg-icon-fe_crosshair kb-adv-heading-icon-side-left\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><circle cx=\"12\" cy=\"12\" r=\"10\"\/><line x1=\"22\" y1=\"12\" x2=\"18\" y2=\"12\"\/><line x1=\"6\" y1=\"12\" x2=\"2\" y2=\"12\"\/><line x1=\"12\" y1=\"6\" x2=\"12\" y2=\"2\"\/><line x1=\"12\" y1=\"22\" x2=\"12\" y2=\"18\"\/><\/svg><\/span><span class=\"kb-adv-text-inner\"><strong><mark true=\"true\" class=\"kt-highlight\">AI-based attack techniques are becoming increasingly sophisticated<\/mark><\/strong><\/span><\/h2>\n\n\n<p>The explosion of AI also brings with it the danger of cybercrime as these advanced tools are being \u201c<a href=\"https:\/\/chongluadao.vn\/blog\/en\/AI_weapon\/\" target=\"_blank\" rel=\"noreferrer noopener\">weaponization<\/a>\u201d&quot; serving criminal purposes:<\/p>\n\n\n<style>.wp-block-kadence-iconlist.kt-svg-icon-list-items5639_1dff2b-82:not(.this-stops-third-party-issues){margin-top:0px;margin-bottom:0px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items5639_1dff2b-82 ul.kt-svg-icon-list:not(.this-prevents-issues):not(.this-stops-third-party-issues):not(.tijsloc){margin-top:0px;margin-right:0px;margin-bottom:var(--global-kb-spacing-sm, 1.5rem);margin-left:0px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items5639_1dff2b-82 ul.kt-svg-icon-list{grid-row-gap:5px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items5639_1dff2b-82 ul.kt-svg-icon-list .kt-svg-icon-list-item-wrap .kt-svg-icon-list-single{margin-right:10px;}.kt-svg-icon-list-items5639_1dff2b-82 ul.kt-svg-icon-list .kt-svg-icon-list-level-0 .kt-svg-icon-list-single svg{font-size:20px;}<\/style>\n<div class=\"wp-block-kadence-iconlist kt-svg-icon-list-items kt-svg-icon-list-items5639_1dff2b-82 kt-svg-icon-list-columns-1 alignnone kt-list-icon-aligntop\"><ul class=\"kt-svg-icon-list\"><style>.kt-svg-icon-list-item-5639_0454cc-ff .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-5639_0454cc-ff kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_alertTriangle kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M10.29 3.86L1.82 18a2 2 0 0 0 1.71 3h16.94a2 2 0 0 0 1.71-3L13.71 3.86a2 2 0 0 0-3.42 0z\"\/><line x1=\"12\" y1=\"9\" x2=\"12\" y2=\"13\"\/><line x1=\"12\" y1=\"17\" x2=\"12\" y2=\"17\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">AI helps analyze entire data warehouses in minutes.<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-5639_9ba48c-c8 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-5639_9ba48c-c8 kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_alertTriangle kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M10.29 3.86L1.82 18a2 2 0 0 0 1.71 3h16.94a2 2 0 0 0 1.71-3L13.71 3.86a2 2 0 0 0-3.42 0z\"\/><line x1=\"12\" y1=\"9\" x2=\"12\" y2=\"13\"\/><line x1=\"12\" y1=\"17\" x2=\"12\" y2=\"17\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">Deepfake AI tool creates fake videos\/voices that are indistinguishable to the naked eye.<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-5639_015f62-95 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-5639_015f62-95 kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_alertTriangle kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M10.29 3.86L1.82 18a2 2 0 0 0 1.71 3h16.94a2 2 0 0 0 1.71-3L13.71 3.86a2 2 0 0 0-3.42 0z\"\/><line x1=\"12\" y1=\"9\" x2=\"12\" y2=\"13\"\/><line x1=\"12\" y1=\"17\" x2=\"12\" y2=\"17\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">AI helps criminals collect information from open source code (OSINT) many times faster.<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-5639_a119cc-71 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-5639_a119cc-71 kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_alertTriangle kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M10.29 3.86L1.82 18a2 2 0 0 0 1.71 3h16.94a2 2 0 0 0 1.71-3L13.71 3.86a2 2 0 0 0-3.42 0z\"\/><line x1=\"12\" y1=\"9\" x2=\"12\" y2=\"13\"\/><line x1=\"12\" y1=\"17\" x2=\"12\" y2=\"17\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">Malicious AI tools help generate malware, write personalized phishing emails, or automate attacks based on user behavior.<\/span><\/li>\n<\/ul><\/div>\n\n\n\n<p>Reports from Trend Micro and IBM Security show that AI has helped hackers shorten 70% attack time and increase accuracy in predicting targets.<\/p>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading5639_c46c33-54, .wp-block-kadence-advancedheading.kt-adv-heading5639_c46c33-54[data-kb-block=\"kb-adv-heading5639_c46c33-54\"]{font-size:var(--global-kb-font-size-md, 1.25rem);font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading5639_c46c33-54[data-kb-block=\"kb-adv-heading5639_c46c33-54\"]{display:flex;gap:0.25em;align-items:center;}.wp-block-kadence-advancedheading.kt-adv-heading5639_c46c33-54[data-kb-block=\"kb-adv-heading5639_c46c33-54\"] .kb-adv-heading-icon svg{width:1em;height:1em;}.wp-block-kadence-advancedheading.kt-adv-heading5639_c46c33-54[data-kb-block=\"kb-adv-heading5639_c46c33-54\"] .kb-adv-heading-icon{color:#fd7e14;}.wp-block-kadence-advancedheading.kt-adv-heading5639_c46c33-54[data-kb-block=\"kb-adv-heading5639_c46c33-54\"]:hover .kb-adv-heading-icon{color:#fd7e14;}.wp-block-kadence-advancedheading.kt-adv-heading5639_c46c33-54 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading5639_c46c33-54[data-kb-block=\"kb-adv-heading5639_c46c33-54\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading5639_c46c33-54 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading5639_c46c33-54[data-kb-block=\"kb-adv-heading5639_c46c33-54\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style><h2 class=\"kt-adv-heading5639_c46c33-54 wp-block-kadence-advancedheading kt-adv-heading-has-icon\" data-kb-block=\"kb-adv-heading5639_c46c33-54\"><span class=\"kb-svg-icon-wrap kb-adv-heading-icon kb-svg-icon-fe_crosshair kb-adv-heading-icon-side-left\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><circle cx=\"12\" cy=\"12\" r=\"10\"\/><line x1=\"22\" y1=\"12\" x2=\"18\" y2=\"12\"\/><line x1=\"6\" y1=\"12\" x2=\"2\" y2=\"12\"\/><line x1=\"12\" y1=\"6\" x2=\"12\" y2=\"2\"\/><line x1=\"12\" y1=\"22\" x2=\"12\" y2=\"18\"\/><\/svg><\/span><span class=\"kb-adv-text-inner\"><strong><mark true=\"true\" class=\"kt-highlight\">Misusing entertainment AI apps and accidentally providing biometric data<\/mark><\/strong><\/span><\/h2>\n\n\n<p>The trends of \u201ccreating photos, creating videos with AI\u201d \u2014 like effects <strong>winter snow<\/strong>, <strong>face transformation<\/strong>, <strong>classical portrait simulation<\/strong>, or <strong>face transplant onto famous people<\/strong> \u2014 is attracting millions of participants.<\/p>\n\n\n\n<p>But behind some fun operations is <strong>users providing biometric data themselves<\/strong> including:<\/p>\n\n\n<style>.wp-block-kadence-iconlist.kt-svg-icon-list-items5639_c1bf93-fc:not(.this-stops-third-party-issues){margin-top:0px;margin-bottom:0px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items5639_c1bf93-fc ul.kt-svg-icon-list:not(.this-prevents-issues):not(.this-stops-third-party-issues):not(.tijsloc){margin-top:0px;margin-right:0px;margin-bottom:var(--global-kb-spacing-sm, 1.5rem);margin-left:0px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items5639_c1bf93-fc ul.kt-svg-icon-list{grid-row-gap:5px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items5639_c1bf93-fc ul.kt-svg-icon-list .kt-svg-icon-list-item-wrap .kt-svg-icon-list-single{margin-right:10px;}.kt-svg-icon-list-items5639_c1bf93-fc ul.kt-svg-icon-list .kt-svg-icon-list-level-0 .kt-svg-icon-list-single svg{font-size:20px;}<\/style>\n<div class=\"wp-block-kadence-iconlist kt-svg-icon-list-items kt-svg-icon-list-items5639_c1bf93-fc kt-svg-icon-list-columns-1 alignnone\"><ul class=\"kt-svg-icon-list\"><style>.kt-svg-icon-list-item-5639_340d47-ce .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-5639_340d47-ce kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_arrowRight kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><line x1=\"5\" y1=\"12\" x2=\"19\" y2=\"12\"\/><polyline points=\"12 5 19 12 12 19\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">face photo,<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-5639_20f85d-bc .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-5639_20f85d-bc kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_arrowRight kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><line x1=\"5\" y1=\"12\" x2=\"19\" y2=\"12\"\/><polyline points=\"12 5 19 12 12 19\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">eye-nose-mouth structure,<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-5639_a4a38f-f5 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-5639_a4a38f-f5 kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_arrowRight kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><line x1=\"5\" y1=\"12\" x2=\"19\" y2=\"12\"\/><polyline points=\"12 5 19 12 12 19\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">expression,<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-5639_9e5751-e6 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-5639_9e5751-e6 kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_arrowRight kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><line x1=\"5\" y1=\"12\" x2=\"19\" y2=\"12\"\/><polyline points=\"12 5 19 12 12 19\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">head movement and facial angle,<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-5639_6db30e-77 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-5639_6db30e-77 kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_arrowRight kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><line x1=\"5\" y1=\"12\" x2=\"19\" y2=\"12\"\/><polyline points=\"12 5 19 12 12 19\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">voice (with voice generation applications).<\/span><\/li>\n<\/ul><\/div>\n\n\n\n<p>Facial data is immutable \u2014 exposed once, lost forever. And in the hands of cybercriminals, it can be used to create deepfakes, unlock biometrics, or impersonate people in financial transactions.<\/p>\n\n\n\n<p>With the development of AI today, when facial data is widely collected, criminals can completely:<\/p>\n\n\n<style>.wp-block-kadence-iconlist.kt-svg-icon-list-items5639_2ffff7-ca:not(.this-stops-third-party-issues){margin-top:0px;margin-bottom:0px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items5639_2ffff7-ca ul.kt-svg-icon-list:not(.this-prevents-issues):not(.this-stops-third-party-issues):not(.tijsloc){margin-top:0px;margin-right:0px;margin-bottom:var(--global-kb-spacing-sm, 1.5rem);margin-left:0px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items5639_2ffff7-ca ul.kt-svg-icon-list{grid-row-gap:5px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items5639_2ffff7-ca .kb-svg-icon-wrap{color:#ff0000;}.wp-block-kadence-iconlist.kt-svg-icon-list-items5639_2ffff7-ca ul.kt-svg-icon-list .kt-svg-icon-list-item-wrap .kt-svg-icon-list-single{margin-right:10px;}.kt-svg-icon-list-items5639_2ffff7-ca ul.kt-svg-icon-list .kt-svg-icon-list-level-0 .kt-svg-icon-list-single svg{font-size:20px;}<\/style>\n<div class=\"wp-block-kadence-iconlist kt-svg-icon-list-items kt-svg-icon-list-items5639_2ffff7-ca kt-svg-icon-list-columns-1 alignnone\"><ul class=\"kt-svg-icon-list\"><style>.kt-svg-icon-list-item-5639_ddae2a-22 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-5639_ddae2a-22 kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_arrowRight kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><line x1=\"5\" y1=\"12\" x2=\"19\" y2=\"12\"\/><polyline points=\"12 5 19 12 12 19\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">create deepfake videos that look like real people 90\u201399%,<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-5639_c4eb92-09 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-5639_c4eb92-09 kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_arrowRight kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><line x1=\"5\" y1=\"12\" x2=\"19\" y2=\"12\"\/><polyline points=\"12 5 19 12 12 19\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">fake video call with identical face,<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-5639_0c4075-f4 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-5639_0c4075-f4 kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_arrowRight kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><line x1=\"5\" y1=\"12\" x2=\"19\" y2=\"12\"\/><polyline points=\"12 5 19 12 12 19\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">Voice + face fusion to scam money transfers, loans, or defame reputation.<\/span><\/li>\n<\/ul><\/div>\n\n\n\n<p>The time it takes to create a deepfake is now just <em>a few seconds<\/em> thanks to the new generation AI model.<\/p>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading5639_bde013-e5, .wp-block-kadence-advancedheading.kt-adv-heading5639_bde013-e5[data-kb-block=\"kb-adv-heading5639_bde013-e5\"]{font-size:var(--global-kb-font-size-md, 1.25rem);font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading5639_bde013-e5[data-kb-block=\"kb-adv-heading5639_bde013-e5\"]{display:flex;gap:0.25em;align-items:center;}.wp-block-kadence-advancedheading.kt-adv-heading5639_bde013-e5[data-kb-block=\"kb-adv-heading5639_bde013-e5\"] .kb-adv-heading-icon svg{width:1em;height:1em;}.wp-block-kadence-advancedheading.kt-adv-heading5639_bde013-e5[data-kb-block=\"kb-adv-heading5639_bde013-e5\"] .kb-adv-heading-icon{color:#fd7e14;}.wp-block-kadence-advancedheading.kt-adv-heading5639_bde013-e5[data-kb-block=\"kb-adv-heading5639_bde013-e5\"]:hover .kb-adv-heading-icon{color:#fd7e14;}.wp-block-kadence-advancedheading.kt-adv-heading5639_bde013-e5 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading5639_bde013-e5[data-kb-block=\"kb-adv-heading5639_bde013-e5\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading5639_bde013-e5 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading5639_bde013-e5[data-kb-block=\"kb-adv-heading5639_bde013-e5\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style><h2 class=\"kt-adv-heading5639_bde013-e5 wp-block-kadence-advancedheading kt-adv-heading-has-icon\" data-kb-block=\"kb-adv-heading5639_bde013-e5\"><span class=\"kb-svg-icon-wrap kb-adv-heading-icon kb-svg-icon-fe_crosshair kb-adv-heading-icon-side-left\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><circle cx=\"12\" cy=\"12\" r=\"10\"\/><line x1=\"22\" y1=\"12\" x2=\"18\" y2=\"12\"\/><line x1=\"6\" y1=\"12\" x2=\"2\" y2=\"12\"\/><line x1=\"12\" y1=\"6\" x2=\"12\" y2=\"2\"\/><line x1=\"12\" y1=\"22\" x2=\"12\" y2=\"18\"\/><\/svg><\/span><span class=\"kb-adv-text-inner\"><strong><mark true=\"true\" class=\"kt-highlight\">Relying on AI chatbots and accidentally revealing too much information<\/mark><\/strong><\/span><\/h2>\n\n\n<p>Unlike traditional search engines (like Google Search), large language models (LLMs) and AI applications typically work on the following mechanism: <strong>Collect input data to back-train the system.<\/strong><\/p>\n\n\n\n<p>In work and study, many people are gradually getting used to:<\/p>\n\n\n<style>.wp-block-kadence-iconlist.kt-svg-icon-list-items5639_b67128-9a:not(.this-stops-third-party-issues){margin-top:0px;margin-bottom:0px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items5639_b67128-9a ul.kt-svg-icon-list:not(.this-prevents-issues):not(.this-stops-third-party-issues):not(.tijsloc){margin-top:0px;margin-right:0px;margin-bottom:var(--global-kb-spacing-sm, 1.5rem);margin-left:0px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items5639_b67128-9a ul.kt-svg-icon-list{grid-row-gap:5px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items5639_b67128-9a ul.kt-svg-icon-list .kt-svg-icon-list-item-wrap .kt-svg-icon-list-single{margin-right:10px;}.kt-svg-icon-list-items5639_b67128-9a ul.kt-svg-icon-list .kt-svg-icon-list-level-0 .kt-svg-icon-list-single svg{font-size:20px;}<\/style>\n<div class=\"wp-block-kadence-iconlist kt-svg-icon-list-items kt-svg-icon-list-items5639_b67128-9a kt-svg-icon-list-columns-1 alignnone\"><ul class=\"kt-svg-icon-list\"><style>.kt-svg-icon-list-item-5639_632513-4e .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-5639_632513-4e kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_arrowRight kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><line x1=\"5\" y1=\"12\" x2=\"19\" y2=\"12\"\/><polyline points=\"12 5 19 12 12 19\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">send internal documents,<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-5639_0dbbac-95 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-5639_0dbbac-95 kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_arrowRight kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><line x1=\"5\" y1=\"12\" x2=\"19\" y2=\"12\"\/><polyline points=\"12 5 19 12 12 19\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">provide personal information,<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-5639_1a6780-1d .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-5639_1a6780-1d kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_arrowRight kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><line x1=\"5\" y1=\"12\" x2=\"19\" y2=\"12\"\/><polyline points=\"12 5 19 12 12 19\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">enter notes, private conversations,<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-5639_d6b2bf-24 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-5639_d6b2bf-24 kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_arrowRight kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><line x1=\"5\" y1=\"12\" x2=\"19\" y2=\"12\"\/><polyline points=\"12 5 19 12 12 19\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">describe habits, preferences, consumer behavior,<\/span><\/li>\n<\/ul><\/div>\n\n\n\n<p>into chatbots like ChatGPT, Claude, Gemini or AI assistants in office applications.<\/p>\n\n\n\n<p>The problem lies in this:<\/p>\n\n\n<style>.wp-block-kadence-iconlist.kt-svg-icon-list-items5639_a07333-ba:not(.this-stops-third-party-issues){margin-top:0px;margin-bottom:0px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items5639_a07333-ba ul.kt-svg-icon-list:not(.this-prevents-issues):not(.this-stops-third-party-issues):not(.tijsloc){margin-top:0px;margin-right:0px;margin-bottom:var(--global-kb-spacing-sm, 1.5rem);margin-left:0px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items5639_a07333-ba ul.kt-svg-icon-list{grid-row-gap:5px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items5639_a07333-ba .kb-svg-icon-wrap{color:#dc3545;}.wp-block-kadence-iconlist.kt-svg-icon-list-items5639_a07333-ba ul.kt-svg-icon-list .kt-svg-icon-list-item-wrap .kt-svg-icon-list-single{margin-right:10px;}.kt-svg-icon-list-items5639_a07333-ba ul.kt-svg-icon-list .kt-svg-icon-list-level-0 .kt-svg-icon-list-single svg{font-size:20px;}<\/style>\n<div class=\"wp-block-kadence-iconlist kt-svg-icon-list-items kt-svg-icon-list-items5639_a07333-ba kt-svg-icon-list-columns-1 alignnone\"><ul class=\"kt-svg-icon-list\"><style>.kt-svg-icon-list-item-5639_0a7bd5-90 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-5639_0a7bd5-90 kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_alertTriangle kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M10.29 3.86L1.82 18a2 2 0 0 0 1.71 3h16.94a2 2 0 0 0 1.71-3L13.71 3.86a2 2 0 0 0-3.42 0z\"\/><line x1=\"12\" y1=\"9\" x2=\"12\" y2=\"13\"\/><line x1=\"12\" y1=\"17\" x2=\"12\" y2=\"17\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">Users have no control over what AI stores,<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-5639_3408b6-28 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-5639_3408b6-28 kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_alertTriangle kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M10.29 3.86L1.82 18a2 2 0 0 0 1.71 3h16.94a2 2 0 0 0 1.71-3L13.71 3.86a2 2 0 0 0-3.42 0z\"\/><line x1=\"12\" y1=\"9\" x2=\"12\" y2=\"13\"\/><line x1=\"12\" y1=\"17\" x2=\"12\" y2=\"17\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">not knowing how much data was used to train the model,<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-5639_3ced41-1a .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-5639_3ced41-1a kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_alertTriangle kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M10.29 3.86L1.82 18a2 2 0 0 0 1.71 3h16.94a2 2 0 0 0 1.71-3L13.71 3.86a2 2 0 0 0-3.42 0z\"\/><line x1=\"12\" y1=\"9\" x2=\"12\" y2=\"13\"\/><line x1=\"12\" y1=\"17\" x2=\"12\" y2=\"17\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">and have no right to permanently delete once uploaded to the server.<\/span><\/li>\n<\/ul><\/div>\n\n\n\n<p>Recent cybersecurity reports from Cloudflare, Kaspersky, Microsoft\u2026 also point to a sharp increase in internal data leaks originating from employees uploading documents to AI chatbots without permission.<\/p>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading5639_2f7641-9a, .wp-block-kadence-advancedheading.kt-adv-heading5639_2f7641-9a[data-kb-block=\"kb-adv-heading5639_2f7641-9a\"]{font-size:var(--global-kb-font-size-md, 1.25rem);font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading5639_2f7641-9a[data-kb-block=\"kb-adv-heading5639_2f7641-9a\"]{display:flex;gap:0.25em;align-items:center;}.wp-block-kadence-advancedheading.kt-adv-heading5639_2f7641-9a[data-kb-block=\"kb-adv-heading5639_2f7641-9a\"] .kb-adv-heading-icon svg{width:1em;height:1em;}.wp-block-kadence-advancedheading.kt-adv-heading5639_2f7641-9a[data-kb-block=\"kb-adv-heading5639_2f7641-9a\"] .kb-adv-heading-icon{color:#fd7e14;}.wp-block-kadence-advancedheading.kt-adv-heading5639_2f7641-9a[data-kb-block=\"kb-adv-heading5639_2f7641-9a\"]:hover .kb-adv-heading-icon{color:#fd7e14;}.wp-block-kadence-advancedheading.kt-adv-heading5639_2f7641-9a mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading5639_2f7641-9a[data-kb-block=\"kb-adv-heading5639_2f7641-9a\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading5639_2f7641-9a img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading5639_2f7641-9a[data-kb-block=\"kb-adv-heading5639_2f7641-9a\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style><h2 class=\"kt-adv-heading5639_2f7641-9a wp-block-kadence-advancedheading kt-adv-heading-has-icon\" data-kb-block=\"kb-adv-heading5639_2f7641-9a\"><span class=\"kb-svg-icon-wrap kb-adv-heading-icon kb-svg-icon-fe_crosshair kb-adv-heading-icon-side-left\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><circle cx=\"12\" cy=\"12\" r=\"10\"\/><line x1=\"22\" y1=\"12\" x2=\"18\" y2=\"12\"\/><line x1=\"6\" y1=\"12\" x2=\"2\" y2=\"12\"\/><line x1=\"12\" y1=\"6\" x2=\"12\" y2=\"2\"\/><line x1=\"12\" y1=\"22\" x2=\"12\" y2=\"18\"\/><\/svg><\/span><span class=\"kb-adv-text-inner\"><strong><mark true=\"true\" class=\"kt-highlight\">AI collects data beyond users&#039; control<\/mark><\/strong><\/span><\/h2>\n\n\n<p>In reality, personal data is collected not only by what users actively provide, but also by countless systems, devices, and applications using machine learning algorithms that operate silently behind the scenes. This creates an environment where users have almost no control over the extent of data collected.<\/p>\n\n\n\n<p>Today, AI is everywhere from browsers, phones, smart TVs, security cameras, home IoT devices, to cars \u2014 most of which use AI or machine learning to:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>record behavior and usage habits,<\/li>\n\n\n\n<li>track search and browsing history,<\/li>\n\n\n\n<li>voice analysis through microphone,<\/li>\n\n\n\n<li>read the content displayed on the screen,<\/li>\n\n\n\n<li>locate and move,<\/li>\n\n\n\n<li>Optimize personal experiences based on accumulated data.<\/li>\n<\/ul>\n\n\n\n<p>This \u201cubiquity\u201d means that it is difficult for users to know specifically which devices are collecting what data, when it is collected, and for what purpose.<\/p>\n\n\n\n<p>Many AI tools, especially mobile apps, not only collect data that users upload (photos, voice, text), but also take:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>device information,<\/li>\n\n\n\n<li>GPS location,<\/li>\n\n\n\n<li>contacts,<\/li>\n\n\n\n<li>linked social network data,<\/li>\n\n\n\n<li>cookies and browsing history,<\/li>\n\n\n\n<li>system information and background activity.<\/li>\n<\/ul>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"2677\" height=\"445\" src=\"https:\/\/chongluadao.vn\/blog\/wp-content\/uploads\/2025\/11\/visual-selection.png\" alt=\"\" class=\"wp-image-5642\"\/><figcaption class=\"wp-element-caption\">Goals for collecting user information<\/figcaption><\/figure>\n<\/div>\n\n\n<p>The more convenient AI is, the less users will care about access. Just one time <strong>allow camera access<\/strong>, <strong>grant read permission to photo library<\/strong>, <strong>connect to account<\/strong> Google\/Facebook, for example, are applications that can harvest large amounts of data that cannot be retrieved. All of what they collect is compiled into a detailed \u201cuser profile\u201d \u2014 an extremely valuable data point for cybercriminals.<\/p>\n\n\n\n<p>Users are increasingly in the dark about their own data. But the biggest problem lies in:<\/p>\n\n\n<style>.wp-block-kadence-iconlist.kt-svg-icon-list-items5639_e72488-c7:not(.this-stops-third-party-issues){margin-top:0px;margin-bottom:0px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items5639_e72488-c7 ul.kt-svg-icon-list:not(.this-prevents-issues):not(.this-stops-third-party-issues):not(.tijsloc){margin-top:0px;margin-right:0px;margin-bottom:var(--global-kb-spacing-sm, 1.5rem);margin-left:0px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items5639_e72488-c7 ul.kt-svg-icon-list{grid-row-gap:5px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items5639_e72488-c7 .kb-svg-icon-wrap{color:#fd7e14;}.wp-block-kadence-iconlist.kt-svg-icon-list-items5639_e72488-c7 ul.kt-svg-icon-list .kt-svg-icon-list-item-wrap .kt-svg-icon-list-single{margin-right:10px;}.kt-svg-icon-list-items5639_e72488-c7 ul.kt-svg-icon-list .kt-svg-icon-list-level-0 .kt-svg-icon-list-single svg{font-size:20px;}<\/style>\n<div class=\"wp-block-kadence-iconlist kt-svg-icon-list-items kt-svg-icon-list-items5639_e72488-c7 kt-svg-icon-list-columns-1 alignnone\"><ul class=\"kt-svg-icon-list\"><style>.kt-svg-icon-list-item-5639_fec57d-dd .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-5639_fec57d-dd kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_alertTriangle kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M10.29 3.86L1.82 18a2 2 0 0 0 1.71 3h16.94a2 2 0 0 0 1.71-3L13.71 3.86a2 2 0 0 0-3.42 0z\"\/><line x1=\"12\" y1=\"9\" x2=\"12\" y2=\"13\"\/><line x1=\"12\" y1=\"17\" x2=\"12\" y2=\"17\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">Data collection sources are opaque and difficult to trace.<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-5639_0e4e60-27 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-5639_0e4e60-27 kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_alertTriangle kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M10.29 3.86L1.82 18a2 2 0 0 0 1.71 3h16.94a2 2 0 0 0 1.71-3L13.71 3.86a2 2 0 0 0-3.42 0z\"\/><line x1=\"12\" y1=\"9\" x2=\"12\" y2=\"13\"\/><line x1=\"12\" y1=\"17\" x2=\"12\" y2=\"17\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">The privacy policy is dozens of pages long.<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-5639_9331d6-98 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-5639_9331d6-98 kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_alertTriangle kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M10.29 3.86L1.82 18a2 2 0 0 0 1.71 3h16.94a2 2 0 0 0 1.71-3L13.71 3.86a2 2 0 0 0-3.42 0z\"\/><line x1=\"12\" y1=\"9\" x2=\"12\" y2=\"13\"\/><line x1=\"12\" y1=\"17\" x2=\"12\" y2=\"17\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">Default mechanism \u201cmaximum collection \u2013 user is responsible if consent\u201d<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-5639_59668d-ed .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-5639_59668d-ed kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_alertTriangle kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M10.29 3.86L1.82 18a2 2 0 0 0 1.71 3h16.94a2 2 0 0 0 1.71-3L13.71 3.86a2 2 0 0 0-3.42 0z\"\/><line x1=\"12\" y1=\"9\" x2=\"12\" y2=\"13\"\/><line x1=\"12\" y1=\"17\" x2=\"12\" y2=\"17\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">Psychology of clicking \u201cContinue \/ Allow \/ Agree\u201d to quickly use the service<\/span><\/li>\n<\/ul><\/div>\n\n\n\n<p>Result: <strong>AI knows more about users than they know themselves<\/strong>, from the level of intimacy in relationships to spending habits.<\/p>\n\n\n\n<p>This opens up a serious risk: when the data is leaked or sold to third parties, cybercriminals can use this \u201cAI profile\u201d to personalize scams, target attacks, and create extremely convincing fake scenarios.<\/p>\n\n\n\n<p>So how to protect personal data in this era of AI explosion?<\/p>\n\n\n<style>.wp-block-kadence-advancedbtn.kb-btns5639_e620a4-a7{gap:var(--global-kb-gap-xs, 0.5rem );justify-content:space-between;align-items:center;}.kt-btns5639_e620a4-a7 .kt-button{font-weight:normal;font-style:normal;}.kt-btns5639_e620a4-a7 .kt-btn-wrap-0{margin-right:5px;}.wp-block-kadence-advancedbtn.kt-btns5639_e620a4-a7 .kt-btn-wrap-0 .kt-button{color:#555555;border-color:#555555;}.wp-block-kadence-advancedbtn.kt-btns5639_e620a4-a7 .kt-btn-wrap-0 .kt-button:hover, .wp-block-kadence-advancedbtn.kt-btns5639_e620a4-a7 .kt-btn-wrap-0 .kt-button:focus{color:#ffffff;border-color:#444444;}.wp-block-kadence-advancedbtn.kt-btns5639_e620a4-a7 .kt-btn-wrap-0 .kt-button::before{display:none;}.wp-block-kadence-advancedbtn.kt-btns5639_e620a4-a7 .kt-btn-wrap-0 .kt-button:hover, .wp-block-kadence-advancedbtn.kt-btns5639_e620a4-a7 .kt-btn-wrap-0 .kt-button:focus{background:#444444;}<\/style>\n<div class=\"wp-block-kadence-advancedbtn kb-buttons-wrap kb-btns5639_e620a4-a7\"><style>ul.menu .wp-block-kadence-advancedbtn .kb-btn5639_1b3e6f-ce.kb-button{width:initial;}.wp-block-kadence-advancedbtn .kb-btn5639_1b3e6f-ce.kb-button{color:#ffffff;background:#28b46d;font-size:var(--global-kb-font-size-sm, 0.9rem);font-weight:400;border-top-left-radius:20px;border-top-right-radius:20px;border-bottom-right-radius:20px;border-bottom-left-radius:20px;box-shadow:0px 0px 16px 0px #198754;}.wp-block-kadence-advancedbtn .kb-btn5639_1b3e6f-ce.kb-button:hover, .wp-block-kadence-advancedbtn .kb-btn5639_1b3e6f-ce.kb-button:focus{color:#e5f4f5;background:#11353d;}<\/style><a class=\"kb-button kt-button button kb-btn5639_1b3e6f-ce kt-btn-size-standard kt-btn-width-type-auto kb-btn-global-fill  kt-btn-has-text-true kt-btn-has-svg-true  wp-block-kadence-singlebtn\" href=\"https:\/\/chongluadao.vn\/blog\/en\/2025\/11\/canh-bao-ai-dang-tro-thanh-vu-khi-tan-cong-cua-toi-pham-mang\/\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_arrowLeft kt-btn-icon-side-left\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><line x1=\"19\" y1=\"12\" x2=\"5\" y2=\"12\"\/><polyline points=\"12 19 5 12 12 5\"\/><\/svg><\/span><span class=\"kt-btn-inner-text\"><strong>AI is becoming a weapon of cybercriminals<\/strong><\/span><\/a>\n\n<style>ul.menu .wp-block-kadence-advancedbtn .kb-btn5639_7007df-ce.kb-button{width:initial;}.wp-block-kadence-advancedbtn .kb-btn5639_7007df-ce.kb-button{color:#ffffff;background:#28b46d;font-size:var(--global-kb-font-size-sm, 0.9rem);font-weight:400;border-top-left-radius:20px;border-top-right-radius:20px;border-bottom-right-radius:20px;border-bottom-left-radius:20px;box-shadow:0px 0px 16px 0px #198754;}.wp-block-kadence-advancedbtn .kb-btn5639_7007df-ce.kb-button:hover, .wp-block-kadence-advancedbtn .kb-btn5639_7007df-ce.kb-button:focus{color:#e5f4f5;background:#11353d;}<\/style><span class=\"kb-button kt-button button kb-btn5639_7007df-ce kt-btn-size-standard kt-btn-width-type-auto kb-btn-global-fill  kt-btn-has-text-true kt-btn-has-svg-true  wp-block-kadence-singlebtn\"><span class=\"kt-btn-inner-text\"><strong>Data security in the AI era<\/strong><\/span><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_arrowRight kt-btn-icon-side-right\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><line x1=\"5\" y1=\"12\" x2=\"19\" y2=\"12\"\/><polyline points=\"12 5 19 12 12 19\"\/><\/svg><\/span><\/span><\/div>\n\n\n\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>The strong development of artificial intelligence in recent years has opened up a series of utilities for life, work and entertainment. However, it also comes with potential risks regarding data security that most users do not realize. [\u2026]<span class=\"screen-reader-text\"> from The explosion of AI increases the risk of personal data leaks<\/span><\/a><\/p>","protected":false},"author":3,"featured_media":5641,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[7],"tags":[],"class_list":["post-5639","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-canh-bao-pho-bien"],"_links":{"self":[{"href":"https:\/\/chongluadao.vn\/blog\/en\/wp-json\/wp\/v2\/posts\/5639","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/chongluadao.vn\/blog\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/chongluadao.vn\/blog\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/chongluadao.vn\/blog\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/chongluadao.vn\/blog\/en\/wp-json\/wp\/v2\/comments?post=5639"}],"version-history":[{"count":6,"href":"https:\/\/chongluadao.vn\/blog\/en\/wp-json\/wp\/v2\/posts\/5639\/revisions"}],"predecessor-version":[{"id":5669,"href":"https:\/\/chongluadao.vn\/blog\/en\/wp-json\/wp\/v2\/posts\/5639\/revisions\/5669"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/chongluadao.vn\/blog\/en\/wp-json\/wp\/v2\/media\/5641"}],"wp:attachment":[{"href":"https:\/\/chongluadao.vn\/blog\/en\/wp-json\/wp\/v2\/media?parent=5639"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/chongluadao.vn\/blog\/en\/wp-json\/wp\/v2\/categories?post=5639"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/chongluadao.vn\/blog\/en\/wp-json\/wp\/v2\/tags?post=5639"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}