The presentation discusses ways to exploit vulnerabilities in search algorithms, plagiarism detection engines, and machine learning systems.
- Using random homographs in text can make it difficult for search algorithms to find the text
- Plagiarism detection engines can be bypassed by swapping in homographic characters
- Consensus poisoning can be used to exploit vulnerabilities in machine learning systems
The presenter showed examples of how using random homographs in text can make it difficult for search algorithms to find the text, and how swapping in homographic characters can bypass plagiarism detection engines. They also discussed how consensus poisoning can be used to exploit vulnerabilities in machine learning systems.