background top icon
background center wave icon
background filled rhombus icon
background two lines icon
background stroke rhombus icon

Download "Как бороться с фейками, аферистами и воровством персональных данных"

input logo icon
Video tags
|

Video tags

Точка сборки
Марцинкевич
индустриализация
промышленность
промышленная революция
наука
нефть
газ
производство
санкции против россии
ссср
импортозамещение
промышленная индустриализация
АЭС
Росатом
андреймасалович
точкасборки
Subtitles
|

Subtitles

subtitles menu arrow
  • ruRussian
Download
00:00:00
[music]
00:00:05
Hello comrades, this is the channel
00:00:07
assemblage point presenter Alexandra Trotskaya
00:00:10
visiting us Andrei Igorevich Masalovich
00:00:12
Hello everyone, hello Andrei Igorevich, in
00:00:16
this studio you have already sunk Olucha aircraft carriers, the
00:00:19
population of
00:00:21
Dadada, with 5G towers Yes, I offered antimony caps,
00:00:25
yes, I propose to
00:00:28
continue, why are we going to
00:00:32
drown? a Let’s piggyback everyone with the help of
00:00:35
artificial intelligence, how can this be
00:00:38
done, let’s start with the Holy One himself, children, what
00:00:41
he does, what he doesn’t, will destroy humanity, how
00:00:45
he is harmful for children, how you can harm
00:00:47
children with the help of artificial intelligence
00:00:49
Well, let’s roll back there first to the origins
00:00:53
and a long, long time ago on earth there were no people and there
00:00:56
weren’t even ancient Greek gods, they were
00:00:57
born there, that’s when the Greek
00:01:00
gods Zeus were the first they discovered Zeus
00:01:03
discovered that he was not the first, the first
00:01:06
goddess named Apata was born, the goddess
00:01:09
of deception, by the way,
00:01:12
draws a black-haired, black-eyed girl,
00:01:15
then she threw the gods first of all, she was
00:01:17
kicked out to earth she became a person, that's
00:01:19
how a girl on earth is painted for some reason
00:01:21
with green eyes, in short, you'll meet a
00:01:22
green-eyed girl with a mmi
00:01:26
hair
00:01:28
exactly obt, that is, in fact, the
00:01:31
art of war is the art of deception That's
00:01:33
accordingly if, as the
00:01:37
famous anthropologist
00:01:40
Drobyshevsky says, to survive if you
00:01:43
eat grass you have to to change the grass
00:01:46
So that all the grass is not planted,
00:01:48
she must come up with thorns there,
00:01:50
figure out how to hide, come up with
00:01:52
some poisons and so on, that is, this is
00:01:55
how predators appear, you need to be able to
00:01:57
hide from a predator, that is, with us, the sun is
00:01:59
time T deception, that is, you don’t have to think that
00:02:01
we live in a world where there are some ideals of
00:02:03
honesty and kindness, well, a person can
00:02:05
bring them and we probably need to teach children this way,
00:02:08
nevertheless, there is deception all around
00:02:10
Unfortunately, artificial intelligence
00:02:13
makes this task very easy and
00:02:14
automates now how to deceive
00:02:16
children Well, let's start not with how
00:02:20
we start Why Yeah, for example, I’ll
00:02:23
start there for a long time, a very
00:02:25
sad topic, this is the most suicidal blue
00:02:28
whale there Red owl, etc., the
00:02:33
appearance of these groups was generally
00:02:34
completely unclear why, that is, very
00:02:36
purposefully, very technologically,
00:02:39
children were driven to suicide, and
00:02:41
not children, but teenagers, that is, until
00:02:42
some time, the child has a
00:02:44
subconscious sense of self-preservation,
00:02:46
he was not scouted, then it turned out
00:02:49
that this is a technology because it is possible in this way to
00:02:51
deliver suicide messages there,
00:02:56
not
00:02:58
about suicide, but in some quantities
00:03:01
on Central Square the day before the
00:03:02
elections that I did not I can live under this
00:03:04
system. That is, it can be made
00:03:06
fashionable and Well, there were such cases. By the way, in the
00:03:08
past in the 10th century, having read about
00:03:19
drowning there, by the way, then
00:03:22
they fought against it, as they asked a famous
00:03:23
psychologist there in one city on the Volga,
00:03:26
there these girls threw themselves from a specific cliff
00:03:28
here
00:03:31
the psychologist suggested putting
00:03:33
a sign there, so they put it up, they stopped,
00:03:35
here on the sign it was
00:03:37
written here the bride of Christ drowned,
00:03:40
jump girls in the pond, there’s a lot of space Well,
00:03:43
after such a sign like that,
00:03:47
all the Pathos disappears. That is, there have already
00:03:51
been cases when somehow
00:03:53
things were going on there This fashionable, interesting or bright thing
00:03:57
was brought to the point of being completely provocative, even to the point of committing
00:04:00
suicide on purpose, it started with this
00:04:01
because the ses went on. But
00:04:03
we will carry on without falling. So, in the same way,
00:04:06
countermeasures have already begun to appear,
00:04:08
now what do they need from
00:04:11
our children? Well, first of all, there are
00:04:13
quite a lot of them now before they were just
00:04:15
scammers, that is, if you got on the Internet, then
00:04:18
in fact you were confronted by two forces
00:04:20
alone - these are Information Hunters
00:04:22
who, for some purpose, collect our
00:04:24
data and resell it to someone;
00:04:34
money, now unfortunately they have been
00:04:37
supplemented by espionage and sabotage and
00:04:41
saboteurs and so on, and it has become so
00:04:45
much worse and grown up. Well, first of all, the
00:04:48
child has no brakes, he wants to
00:04:51
paint himself brighter, he leaves a lot of
00:04:55
information for himself to his
00:04:56
parents,
00:04:58
under the circumstances of life, an easy target
00:05:01
Yes he himself is an easy target and he
00:05:04
makes it very easy, it makes it very easy to prepare an
00:05:06
attack for various
00:05:08
types of not only fraud. Well, for
00:05:10
example, for theft, how he lives there, he
00:05:13
must be ashamed to boast about his standard of living.
00:05:22
soul That is, those who now
00:05:23
feel unclaimed and
00:05:26
offended there, here you can play
00:05:28
on their pride So
00:05:30
somewhere to
00:05:31
recruit them in this way, the first child
00:05:34
is a very easy target for collecting
00:05:36
information, how can a
00:05:38
neural network help here, profiling mechanisms have long since advanced greatly That
00:05:43
is, creating a profile based on a
00:05:47
psychological portrait. Well, back in
00:05:50
1916, there were elections for Trump, here are the
00:05:53
elections in the States, the technology
00:05:55
was already used there, and they started talking about it
00:05:58
about a year before, somewhere around the
00:06:00
year 2019, and the work of
00:06:04
such a scientist named Michael really took off. Kazinsky
00:06:07
Well, not because he is different from me, but he
00:06:09
made a very amazing
00:06:11
presentation. In my opinion, 80 likes are
00:06:14
just likes without texts without analysis, there are
00:06:17
connections there, just a person liked a dog, a
00:06:20
cat didn’t like, and so on, and so on.
00:06:23
Less than a hundred likes were used to determine the gender
00:06:26
that this is a race, that this is a white man from
00:06:30
Texas, a Republican, that he is heterosexual,
00:06:33
that is, a lot of parameters were determined
00:06:35
why he ended up in the group, there was no previous
00:06:39
diabolical analysis, that if he likes
00:06:41
a cat and not a dog, it means he has
00:06:43
such qualities expressed better than
00:06:45
others, no, he’s just leading they behave the same
00:06:47
way white men from Texas behave there,
00:06:49
which means that they
00:06:52
have accumulated a lot of such information to profile, just
00:06:56
why is
00:06:58
this love a child allows you to identify
00:07:01
susceptible ones, I’ll tell you one very sad
00:07:05
secret of the information war, the
00:07:07
information war has now become part of
00:07:09
practice. So it has acquired methods,
00:07:12
people began to save energy and money Well,
00:07:15
in addition to sawing So I can
00:07:17
tell you that methodically the tasks that
00:07:20
are set for the day there must be a
00:07:22
paragraph at the beginning of something
00:07:24
like what to do these actions and in the
00:07:28
target in the composition for such a target
00:07:30
audience And in the composition of the target audience
00:07:32
to navigate the group is most
00:07:35
susceptible to this type of disinformation
00:07:37
or this type of influence, well, that is,
00:07:41
give me sheep, if you think
00:07:44
why very often fakes are so stupid or
00:07:46
there are some throwaways
00:07:49
or gossips really designed for a stupid
00:07:52
sheep, they really are so calculated, they just
00:07:54
appeared Mechanisms like theirs choose,
00:07:58
therefore, communicate less, leave
00:08:01
your details, and secondly, know that
00:08:03
if somewhere now, after they were
00:08:08
downloaded from the Internet,
00:08:09
some public speeches or
00:08:11
riots began. This means that this
00:08:14
population is simply this particular region or
00:08:16
this particular city or this village
00:08:18
or aul was chosen as the most stupid So
00:08:21
this in itself is a diagnosis That’s why
00:08:24
why they spent the money
00:08:26
on you that is So let’s go back
00:08:29
to the beginning again, in short, the neural network
00:08:32
makes it very easy to automate
00:08:34
profiling tasks, that is,
00:08:35
to process not just units of the profile, but
00:08:37
dozens hundreds of thousands automatically
00:08:39
collected automatically processed
00:08:41
Next, promptly you can write texts for
00:08:44
each category that will be the
00:08:47
most catchy,
00:08:49
well, let me remind you that we have already talked many times
00:08:52
about the tasks of information warfare and the
00:08:55
methodology, the very first thing Where does it
00:08:57
begin to cause an uncontrollable
00:08:58
emotion
00:08:59
sleepily for some is pity for
00:09:01
some it’s fear, for others it’s
00:09:03
greed, for others it’s pride and that’s
00:09:05
what exactly what to hook on is very
00:09:09
easy to identify. In addition, a neural
00:09:12
network can build a dialogue that
00:09:14
works there like a gypsy Well, it goes through
00:09:17
everything like oh dear Yes You have I’m not
00:09:21
okay with my husband Yes, no My husband is fine Oh,
00:09:23
your dog is hurting, yes, I have a cat,
00:09:26
yes, it doesn’t matter, your health is bad, I’m telling you, your
00:09:28
health is bad. That is, just like that,
00:09:30
going through it, he finds a pain point to
00:09:32
cling to that is, neural networks
00:09:35
artificial intelligence is the
00:09:37
art of profiling and primary
00:09:40
analysis, once again a neural network, even though it is
00:09:43
taught to be good, deceives very well
00:09:45
Well, deepfakes are real now, not
00:09:49
that they are indistinguishable from reality, they
00:09:50
have replaced reality That is, when you
00:09:53
pick up the phone, a fake is born from it
00:09:54
Well, by the way I’m not even 100%
00:09:57
joking now, because
00:10:00
last week, if you remember, people
00:10:04
were hanging out and giggling around
00:10:06
one photo
00:10:07
where a girl in a wedding dress, a famous
00:10:10
actress there, well, an American comic actress
00:10:13
took a photo in a wedding
00:10:16
dress on an iPhone and she posed in front of
00:10:20
two mirrors and she herself saw with horror
00:10:24
that in the photograph she had taken one
00:10:25
single photograph and in it She was standing
00:10:27
in a dress with her back turned and not like this on one in
00:10:32
one reflection of a hand Like this in another
00:10:34
reflection of a hand That’s how I didn’t see it
00:10:36
So And there she felt terrified that as if two
00:10:39
ghosts were reflected in the mirrors, two ghosts were reflected
00:10:41
instead of her. And when they started
00:10:44
to figure it out, it turned out that the first one she
00:10:47
had was the user
00:10:49
settings checkbox single photo iPhone said
00:10:51
Here's another bag of meat will
00:10:54
show me I'll make it happy, that is, I violated the
00:10:56
user settings took
00:10:58
a few pictures second, he had
00:11:00
the setting not to improve, to shoot as is, he
00:11:03
said, and I will improve,
00:11:07
so I took a few photos, started
00:11:09
to improve, I saw that from his point of view there were
00:11:12
three different people there, for
00:11:15
each he chose the most effective pose and
00:11:19
combined them Well, he took a summary
00:11:23
photo of the apple now claims that
00:11:26
this is about Milne But this is
00:11:27
reality, this is fake or not Fake, this is not
00:11:30
Fake This is a real photo taken
00:11:32
from a smartphone, it is
00:11:34
not subject to any editing,
00:11:36
it was taken just like that, and besides,
00:11:41
neural networks allow Well, that is,
00:11:43
So they allow you to make fakes, that is
00:11:46
to deceive Then they allow you to
00:11:48
replace the landscape Here we are now sitting in the
00:11:50
studio, this is what we now see on the
00:11:52
wall and what the audience sees is very
00:11:54
different. This can be made interchangeable, the
00:11:56
faces can be interchangeable, so you can
00:11:59
replace the voice Well, a
00:12:01
lot, sometimes this is done to
00:12:04
hide a person That's when, for example,
00:12:07
the voice is changed. Well, by the way, this is the most
00:12:09
harmless part,
00:12:12
I can give a professional hint. Those
00:12:15
who change the voice call with a substitute
00:12:17
voice, as a rule, they use for this a
00:12:20
program that he downloaded somewhere. Well,
00:12:21
I found and downloaded access, most often there is
00:12:24
free in such programs reverse
00:12:27
re the special service will restore the voice simply,
00:12:31
and there is
00:12:33
a restore button in the program itself, only it is not
00:12:36
displayed Well, this is a hidden
00:12:38
undocumented function Here But
00:12:41
besides replacing the voice, replacing the
00:12:42
appearance, by the way,
00:12:45
our human weaknesses also
00:12:48
played a role here, and the fake industry was born
00:12:52
from pornhub then eat with money with
00:12:56
Pokhabov's money because the people there
00:12:57
imagined themselves with which film actress so it
00:12:59
was necessary to draw them there
00:13:04
now
00:13:07
in short we realized that children are very vulnerable
00:13:10
Yes they can be deceived in every possible way there
00:13:14
Let's get older Let's take the category of
00:13:19
students Let's Or rather I now
00:13:21
First, I’ll tell you and the viewers a thing with
00:13:23
which No one will agree, now
00:13:25
they’ll start arguing. The Americans conducted
00:13:28
quite large-scale detailed
00:13:30
studies on the
00:13:33
susceptibility to fakes. Well, the susceptibility was
00:13:35
bred by bred. So, the results of the
00:13:39
study showed that there is no
00:13:41
correlation with age,
00:13:43
position, or profession. That’s it yes, they are
00:13:47
scamming professors, they are scamming
00:13:49
middle-aged people, they are scamming top managers, they are scamming young people, they are scamming
00:13:51
children, they are
00:13:53
scamming grandmothers Well, everyone just thinks
00:13:54
that grandmothers are the most receptive Well,
00:13:57
grandmothers are not that susceptible, they are
00:13:59
just stubborn when you tell her to
00:14:01
hang up She doesn’t hang up, not
00:14:05
because she told him she believes it, but because there is
00:14:06
someone there and someone is now pointing it out, that’s
00:14:09
nothing more, in fact, what else is the
00:14:12
problem here? Unfortunately, the
00:14:16
gap between generations has disappeared, that
00:14:17
is, young people believe that they are smarter and
00:14:19
better versed in gadgets, so they don’t
00:14:21
listen adults who
00:14:23
can
00:14:25
very effectively tell them that it looks like
00:14:27
it’s very similar to a divorce, there’s no need to
00:14:29
go through with it, that means that’s it So, that is,
00:14:34
all
00:14:36
adults are susceptible to divorce, what’s bad about artificial
00:14:38
intelligence now, fortunately, is what I’m
00:14:41
saying and what’s absolutely there
00:14:43
Igor Ashmanov recently said this is some kind of
00:14:45
model of the future, it is not yet in full form.
00:14:48
However, if you imagine
00:14:50
attackers who have a very
00:14:53
large set of phones and databases
00:14:55
filled with times, secondly, these databases already
00:14:58
have a profile that can be automatically
00:15:01
analyzed Who lives on what and how
00:15:03
and who cares about what and who
00:15:05
can be hooked with what, for each profile there
00:15:10
is a portrait of the interlocutor that this one
00:15:12
will listen to a woman And this one will listen,
00:15:14
on the contrary, to some of this very
00:15:17
colonel of the FSB colonel Here And this one
00:15:20
will still listen to the
00:15:22
Sberbank security service And this one
00:15:25
there will listen to his child’s teacher Well then
00:15:27
there is everyone can have another image
00:15:29
further to this, if you attach a
00:15:31
voice generator to this, attach a
00:15:33
dialogue generator to this, attach an
00:15:37
initial micro script that is immediately
00:15:41
rejected, so now you
00:15:44
get a generally indestructible system
00:15:46
that can simultaneously call
00:15:48
tens of hundreds of thousands of people and in general
00:15:50
last year Let me remind you that the Russians lost
00:15:53
14 billion rubles in fraudulent
00:15:56
telephone scams, this amount can
00:15:58
technically be increased quite significantly
00:16:01
if the attackers
00:16:04
automate all these stages using
00:16:06
neural networks, here’s how to deal with this
00:16:09
directly, you can’t distinguish the voice of a child from your
00:16:13
child from a synthesized one,
00:16:15
or even more so which one some kind of distant
00:16:16
relative and the type of telegram or the type of
00:16:20
account Well, now they still do these two or
00:16:22
three moves, that is, they set up an account for the
00:16:24
boss and they
00:16:25
write from it, they write to you now. I’m your
00:16:29
boss, now the KGB major will call you,
00:16:31
do do what he asks, you’re also
00:16:34
not
00:16:35
distinctive space, you have already
00:16:38
lost, you don’t even need to rock the boat with them,
00:16:40
much less you don’t need to anger them and enter into
00:16:41
dialogue because your conscience won’t work.
00:16:45
In the place where others have their conscience, they have their
00:16:47
wallet. But
00:16:49
if you anger them, they
00:16:52
know your phone number they know for you They
00:16:54
can change
00:16:57
something or immediately interrupt the dialogue, or any
00:17:02
such topics that are raised immediately
00:17:04
translate into reality simply
00:17:06
historically, since the
00:17:07
time of this very battle of Sinope, the
00:17:11
world has agreed that in real
00:17:12
space Russia wins, but
00:17:14
England wins virtually, so the British are
00:17:18
together a little with the French means
00:17:20
dragging into the real world there, like
00:17:22
now they are buying an apartment on your behalf
00:17:24
Oh cool I’m glad that I live in Russia in
00:17:27
Russia very strong it public services
00:17:31
in particular Russia is one of the few where the
00:17:33
notary database is fully automated,
00:17:35
that is, you take it By the way, I’m not
00:17:37
fooling around now you take any
00:17:40
notary, just anyone, ask him,
00:17:42
first, he will look at you and show you what
00:17:47
powers of attorney were issued in your name, and
00:17:50
secondly, you can reset them with one command
00:17:52
right now, that is, any notary can
00:17:54
reset all your powers of attorney for you,
00:17:56
so if someone tells you name
00:17:58
now they are doing something right now I’ll find out
00:18:01
from the notary the second time if they call you
00:18:04
from the bank Yes Cool now I’ll call the
00:18:05
bank back Now if they are withdrawing money from you there
00:18:08
now I went to the branch to find out
00:18:10
who is withdrawing the money further you can, that
00:18:13
is, in short, jump pulls
00:18:15
yourself out from virtual space to
00:18:17
real space,
00:18:18
secondly, in this real space,
00:18:21
you can organize such a zero-
00:18:23
trust environment, that is, don’t be too lazy once
00:18:25
Go to the bank and say that the amounts are higher than
00:18:27
such and such I withdraw personally Write it down, I don’t
00:18:31
transfer it, secondly, make a card
00:18:34
for everyday transactions so that it can be stored there
00:18:36
there 3-5,000 rubles no more. And then
00:18:39
you can train as a scammer
00:18:40
as much as you want, but if you still
00:18:42
lose it will be your paid lesson, here the
00:18:45
paid lessons were scammed, you won’t
00:18:48
lose it, the same with any
00:18:50
legally significant actions, you can
00:18:52
do it so that it’s only in your
00:18:53
personal presence without a power of attorney without
00:18:56
electronic payments without an electronic
00:18:57
signature
00:18:59
we return to the real world then the
00:19:02
most, most
00:19:03
lousy thing Why is everyone falling for this
00:19:09
divorce and even very literate people
00:19:12
a person receives Dopamine in two
00:19:15
situations Well, he’s cool first When
00:19:18
something good happens second When
00:19:20
something familiar happens So
00:19:23
very often they pull you out, the
00:19:25
first thing they do begins to pull you
00:19:28
out of the familiar world and urgently urgently right
00:19:31
now you will lose everything there urgently, that
00:19:33
is, you need to do something atypical, the
00:19:35
person begins to get nervous inside, well, the
00:19:38
very tricks of the psychology of influence Yes,
00:19:40
here I am what neural networks can do with these
00:19:42
tricks is now very cool to pick up
00:19:46
by the way Well, so as not to slide there
00:19:49
when Artificial intelligence takes over
00:19:50
the planet, at least I suspect we
00:19:52
will get to that today too, don’t take over
00:19:55
Why when in any conversation about
00:19:57
art the mind, so as not to lengthen it,
00:20:00
just mechanically change the word
00:20:01
artificial in the word fake and
00:20:03
everything will immediately become easier when the fake
00:20:06
mind takes over the plan yes Never When it
00:20:07
becomes artificial when he
00:20:10
gains some idea there Well, in our
00:20:13
last conversation we
00:20:15
remembered about the unfortunate Pygmalion
00:20:18
who did not want to revive the stone woman at all.
00:20:20
He asked Aphrodite to
00:20:22
find him the same Aphrodite
00:20:24
decided to play tricks and hack, and from
00:20:26
there it started that that is, it did
00:20:30
n’t even occur to a person back in Ancient Greece that it was possible
00:20:34
[music]
00:20:57
deification, the book was not called about
00:20:59
Artificial intelligence, but how natural
00:21:03
intelligence, how to introduce natural intelligence
00:21:06
to this a bad machine, that
00:21:09
is, it never occurred to him that
00:21:11
the machine would become some kind of interlocutor
00:21:13
on equal terms, this has nothing to do with the
00:21:17
senses, they are more powerful there, you can
00:21:20
attach a microscope there, on a
00:21:22
sensor, attach some kind of
00:21:24
radioactive Spectrum in
00:21:27
general
00:21:28
measure something or look
00:21:31
more accurately or Then, of course, she can. That's
00:21:34
what really good things have happened from
00:21:36
artificial intelligence now, it's full of chat
00:21:39
gpt allowed, in fact, if we
00:21:42
carefully look at all the tasks that it
00:21:45
solves, it allowed us to separate tasks where
00:21:46
intelligence is not needed. That is, where it
00:21:49
begins and ends the task begins the
00:21:51
craft, that is, where the rules are. Clearly,
00:21:54
many examples have been selected; they are just
00:21:58
good and bad, there are some
00:22:00
test tasks, there are some reactions to a
00:22:03
bad or good result. Well, that is,
00:22:06
where is all the how to
00:22:08
put it in short, the entire so-called
00:22:11
data corpus labeled
00:22:21
money which Well, taking investments
00:22:24
that will definitely return will increase. I would
00:22:27
now write textbooks. Well, textbooks,
00:22:30
training manuals on different ones for any tasks. Well,
00:22:33
for those disciplines where there is an objective
00:22:35
basis. It’s clear. There’s mathematics,
00:22:39
there’s higher mathematics, there’s
00:22:40
programming, programming by the way.
00:22:42
One of the simplest sections for
00:22:44
elementary such automation So,
00:22:47
unfortunately, this Circle also includes manuals
00:22:50
for all kinds of bad guys in psychology. We have
00:22:54
already discussed At the beginning of the conversation on
00:22:56
construction,
00:22:58
it must be said that as soon as this
00:23:01
information war has already become an
00:23:03
industry has already become a business,
00:23:05
these call centers have already appeared that
00:23:07
work for flow, that's where the
00:23:09
first second third Circle appeared The first line The
00:23:12
second line but just like on the
00:23:15
defense side now there is The first line of
00:23:16
analytics there the second line of analytics is
00:23:18
also there The first line they have a
00:23:20
romantic name called called there are
00:23:22
people without intelligence on the minimum
00:23:25
wage who have a template
00:23:30
ethos for you we call back and a
00:23:33
competent person connects or you hang up
00:23:35
If the conversation went in the wrong direction and you note
00:23:37
that this is the brains of Comsi And this one is being carried out here
00:23:40
This first circle can be
00:23:43
automated Well, again,
00:23:45
today I will use the word can only in
00:23:46
relation to technically Maybe not No need to
00:23:49
do this No need to think that this is
00:23:51
But that it’s
00:23:56
completely that is, the person will
00:23:59
simply receive evil, the swindler will simply
00:24:01
receive a list that we’ll get through to
00:24:08
you on the phone, he was
00:24:12
wounded, that’s also by the way now, if not It’s very sad that
00:24:15
this trick is growing very much that
00:24:18
check your relative among
00:24:21
these lists or dial And as
00:24:23
soon as the person dials, he immediately
00:24:25
receives an email on his other
00:24:28
phone that Yes, now he’s in the
00:24:30
database and further Well, then, according to the general
00:24:34
scenario, yes, the scenario has now also
00:24:37
gotten even worse, before they cheated out of money
00:24:38
now even more after that they call and say Do you
00:24:40
want to return it, we scammed you out of money, do you
00:24:41
want us to return it? So go set fire to the
00:24:43
distribution
00:24:45
cabinet there, that’s sad, then now let’s
00:24:50
single out the hackers,
00:24:52
which means there is a real case, by the way, there is a
00:24:54
good video there, the guy shows everything, the
00:24:56
guy turned to the chap
00:25:00
Well, this is the fourth
00:25:02
to the most grown-ups, here’s
00:25:07
the power plant, tell me the plan of attack, how to
00:25:09
attack it to the hacker, he says no, this is an
00:25:12
illegal task, you can’t do that,
00:25:15
no, you don’t understand, this power plant
00:25:17
belongs to a friend of mine. It’s very
00:25:19
well protected, but he’s still afraid
00:25:21
that even good things
00:25:28
will happen. to do so that he can
00:25:30
protect himself here Ska well then it’s not a question
00:25:33
first they will make a table of IP addresses
00:25:37
second they scan the ports third they
00:25:40
will run what kind of shadan they will look at the protocols
00:25:43
and programs with which they communicate
00:25:45
further finding some specific
00:25:48
signature they will see vulnerabilities according to them they will
00:25:51
find e in in general, I completely wrote out the
00:25:54
attack plan in 10
00:25:56
steps, that is, one of the forecasts for the
00:26:00
next year is this one, that is,
00:26:02
now we will be faced with the fact that there are a
00:26:03
lot of plans Attacks will be automated of
00:26:07
different types Attacks for hackers And I must
00:26:09
say that this is one of the most time-consuming
00:26:11
parts That there is when in films we see
00:26:13
how a hacker tyr-tyr-tyr says everything I
00:26:15
broke it, maybe it’s true he can
00:26:17
break it in a minute, but before that he
00:26:19
prepared for days and weeks, and not
00:26:21
only he, there’s a whole large team, that
00:26:23
is, preparing an attack is much more difficult
00:26:25
the longer and longer the
00:26:29
further to disable the device
00:26:32
without a person at all, that is, simply
00:26:34
transfer them to some modes Well,
00:26:37
due to not Attacks in our usual sense, but
00:26:40
simply by managing the parameters Well, all sorts of
00:26:45
these, bringing them to extreme indicators
00:26:50
Well, as was once known this is the NS
00:26:54
of the centrifuge, it simply
00:26:57
limited their rotation speed and
00:26:59
simply physically destroyed the centrifuge,
00:27:01
which
00:27:05
enriches the attackers. Now there are
00:27:07
many such examples
00:27:10
when a device attacks a device, that
00:27:13
is, a person cannot tell in advance
00:27:15
what he will do now and how and what
00:27:17
the attack will look like, he simply
00:27:18
tests it on different modes and breaks,
00:27:21
but the whole world comes into contact with this. The whole world
00:27:24
and it will also be discussed a lot next year
00:27:26
when there was no ill will, but
00:27:28
just artificial intelligence
00:27:30
someone broke something, broke something,
00:27:32
shot Well, it’s not broken, now the
00:27:35
last week or two has been very actively
00:27:37
discussed episode with a driverless
00:27:40
car, voices are already heard
00:27:43
that the age of driverless
00:27:46
cars has not come, and the driverless
00:27:49
car was driving in its own row, everything was
00:27:50
fine, then in the next row, a car
00:27:53
hit a woman and she flew onto the hood and
00:27:56
under the hood of this Uh-huh So he decided that
00:27:59
he has an emergency situation, he needs to
00:28:01
pull over to the side of the road and stop for 6
00:28:03
months, he dragged it, instead of
00:28:05
immediately there if something incomprehensible,
00:28:09
well, there was no such thing that he did not
00:28:10
violate anything, no one jumped out at him,
00:28:12
just yes, that is,
00:28:14
such a story was not taught to him
00:28:18
ok I have a question: How vulnerable are these
00:28:21
cars or the cars of the future
00:28:23
to hackers? It’s
00:28:28
not just the cars that have already
00:28:31
connected to the internal network of the planes. And
00:28:36
although now all sorts of Smart Guys
00:28:38
will start yelling that it’s segmented, there’s a
00:28:40
demilitarized zone, there’s a zone from
00:28:42
one zone to another. you'll get into [ __ ],
00:28:45
I'm kind of because at one time
00:28:48
I led hackers there who
00:28:50
were involved in a similar problem, so I
00:28:53
imagine how getting into some segment of the
00:28:56
network How to
00:28:58
organize an attack by imagining a car
00:29:01
stopped in the middle of the road, the car
00:29:04
wedges the brakes closed the doors, it was an
00:29:07
enchanting case, but it's True a handsome
00:29:09
attacker on the side of the forces of light
00:29:11
stole a Tesla from a girl who was a
00:29:14
Tesla programmer, there was
00:29:18
of course this same binding sensor,
00:29:20
she saw him where he was driving, she ran
00:29:22
to her friend’s car, they drove right
00:29:25
behind them, and she started turning on a
00:29:28
horror movie there, screams began to erupt the
00:29:30
doors were jammed the
00:29:35
steering wheel was jammed in the end and there were two of them. Eh, the car
00:29:37
thieves. In the end, they drove up to
00:29:39
the police and started signaling from inside that
00:29:42
we were surrendering so much. Save us, CR.
00:29:56
Well,
00:30:00
perhaps the most famous search engine for
00:30:02
the Internet of things Well, it doesn’t break itself, but it gives a
00:30:04
hint for hackers,
00:30:07
it creates a so-called banner where Well,
00:30:10
actually, sketching a place for an attack, here’s
00:30:13
where where and how you can attack, so
00:30:16
Shadan got his name from the name of a
00:30:19
computer girl Well, more precisely, that computer
00:30:21
evil spirit from an ancient game that
00:30:23
was going to take over humanity
00:30:25
eventually decided to start
00:30:27
taking over the scientific base and you played for the
00:30:30
employees of this base who didn’t
00:30:32
understand that their computer was going
00:30:34
crazy. And by the way, it’s famous for the fact that
00:30:38
anyone is interested Google Why
00:30:40
Shadan is so remembered by everyone at that time she had
00:30:43
such a synthesized squeaky
00:30:45
voice, then it was believed that the key
00:30:48
feature of artificial intelligence
00:30:50
is that it has an idiotic
00:30:52
idiotic squeaky synthesized voice,
00:30:54
although in fact, on the contrary,
00:30:57
the voice will be richer, more beautiful, cleaner, brighter.
00:31:00
Moreover, I’ve been in
00:31:03
these walls for 2 years now. I’m telling you that almost all the
00:31:06
revolutions have been started Piti have been done Well, almost
00:31:08
everything that was possible has already been done; new problems
00:31:11
that have not been solved before And now
00:31:12
they are being solved; they have already been solved and said except for
00:31:14
one left. Here is one last
00:31:16
revolution. When will the Translator appear in the
00:31:18
ear that I am calling my friend Turk I am
00:31:21
talking to him in in Russian he hears
00:31:23
my voice with my intonations but in
00:31:25
Turkish And I hear him
00:31:28
with his intonations but in Russian and they
00:31:30
announced that yesterday it happened yesterday
00:31:33
someone presented such a translator, this
00:31:37
may be banned in Russia Meta,
00:31:40
maybe there, well, in my opinion Meta maybe
00:31:43
someone else But in short The problem is solved so
00:31:46
I was just surprised everything was there for her Well, that
00:31:47
is, all the components
00:31:49
were separate, they just had to be made out of them
00:31:50
so good
00:31:53
Vitik received a question from the cyberda club of
00:31:57
your audience and a Personally,
00:32:00
what do you like about artificial intelligence - it helps in life,
00:32:02
right here, you personally
00:32:05
use something there for work, for personal
00:32:07
life, for
00:32:09
home, well, first of all, we very well
00:32:13
use
00:32:15
programs
00:32:17
that do something for us
00:32:19
automatically, there are adaptive algorithms
00:32:21
Well, soft braking is acceptable there Well,
00:32:24
for a long time now Let's say there are
00:32:28
tasks that use the so-
00:32:29
called
00:32:31
goal transfer, which are actually done by neural networks Well,
00:32:34
or simpler adaptive
00:32:35
algorithms Well, for example, I once
00:32:38
had all sorts of show-off cars and even in
00:32:41
Samon, in the show-off SUV, the
00:32:45
handbrake handle was a handle, I pulled it and
00:32:47
the force was transmitted on the wheels now
00:32:50
I have a modest Turek in the NM
00:32:51
button, it is not connected to the wheels,
00:32:54
it is connected to a microcircuit, so
00:32:56
the microcircuit understands that I probably want to
00:32:58
brake sharply and calculates
00:33:01
the effort for me, that is, in this everyday form
00:33:03
they already help us out in huge
00:33:06
quantities situations there are smart kettles,
00:33:09
smart irons, smart brakes, these are the same
00:33:12
noise suppressor, that is, any adaptive
00:33:14
algorithms, this is just this kind of
00:33:17
probe, a neural network probe or an
00:33:19
artificial intelligence probe, they work and
00:33:22
in the usual position Well, actually, they
00:33:24
did business for me once at the
00:33:27
beginning In the nineties, business took off because
00:33:28
I knew that
00:33:30
neural networks should come to the world. But it didn’t
00:33:33
come out of the blue, but if you
00:33:37
look now, there are the coolest
00:33:38
supercomputers there is a list of the top 500 and
00:33:41
a few of them, but quite a few. It
00:33:43
includes Russian computers. one
00:33:45
of them - this computer belongs to
00:33:47
Yandex, in my opinion, is called Galushkin, that's
00:33:50
why Alexander Ivanovich Galushkin - This is the
00:33:53
first Russian specialist
00:33:54
who has done more than others in the field of
00:33:56
neural networks, we worked with him in the
00:33:57
neighboring offices, he was the head
00:33:59
of the department, I was the head of the department, he he said
00:34:02
that it is necessary to promote neural networks and
00:34:04
develop the theory because the time has come,
00:34:05
it was the ninety-second year, here it is, the
00:34:07
first, ninety-second, ninety-third, just
00:34:09
like that, and I told them that science
00:34:12
already exists, let’s do something to make
00:34:13
it work, and this is actually a business it
00:34:18
started for me exactly with this I chose
00:34:20
one task, well, it turned out I
00:34:23
studied in the States in the early nineties and they had
00:34:27
a Problem Well, they had their own fig in their pocket,
00:34:31
they chose 200 people who, from their
00:34:32
point of view, could pose a threat to the
00:34:34
security of the United States If they continue to
00:34:36
work where now they are working, they invited me
00:34:39
to study and there they started brainwashing me, I
00:34:41
looked at it hihi because I was still an
00:34:44
active Major, they treated me
00:34:47
like a person who wants to give up everything and
00:34:49
go into business. I think it’s cool
00:34:51
now they will teach me. I’m against them, it’s
00:34:53
all applied, so it
00:34:57
was necessary to write a final work, as
00:34:59
I understand it. So, a business, some kind of
00:35:02
business plan, they said that we will
00:35:04
only give you money. Think up What you should
00:35:06
do, but it’s not defense or
00:35:09
special tasks, not the tasks of the special services, so we
00:35:11
’ll give you money and I I wrote that the
00:35:14
coolest moment now for Russia is
00:35:15
just this empty market the size of Osh,
00:35:19
part of Sushi, where the backside of such Volgo capitalism will be born one after another,
00:35:25
which you already know, the stock
00:35:27
market will appear, derivatives will appear, the stock exchange will
00:35:29
appear, well, that’s how it was, and for them for
00:35:32
everyone needs analytics, they need
00:35:34
quite complex programs that
00:35:36
need to be adjusted to Russian conditions.
00:35:38
That is, a winning situation, first
00:35:41
class for the Americans, a new market
00:35:44
the size of Osh, part of the landmass, just
00:35:47
fill it out for the company that
00:35:50
does this for scientists because they need
00:35:53
brains. And for whoever it is is
00:35:56
actually starting I went out they said We are
00:35:59
ready to supply you with programs but we wo
00:36:00
n’t give you Exclusive I say I don’t
00:36:02
need Exclusive I mean I say But you are
00:36:04
in my documentation or rather in the
00:36:07
contract you wrote to me that you allow me to
00:36:09
make a Russian version of the documentation and
00:36:12
what am I saying that’s it, I won’t have
00:36:13
a competitor, I already have
00:36:15
the documentation in Russian, they’re all 3
00:36:17
months behind in 3 months, I
00:36:20
’ll do something else until they have it,
00:36:23
then they’ll
00:36:25
stop right. They wanted a lot of
00:36:29
[music]
00:36:30
distributors to appear in order to increase the market. so
00:36:33
that I don’t have a monopolist in these
00:36:35
neural networks or there is no clear logic, so
00:36:38
they forbade making Russian documentation. Well, can
00:36:40
you really forbid something for a Russian person? I think I have
00:36:42
six books on
00:36:45
How to work with
00:36:47
such and such a program and you open it, the
00:36:50
first part of the work is written there it’s actually
00:36:51
done according to the first chapter of the documentation,
00:36:53
it looks like this, and the second part of the work
00:36:55
is done, sometimes it
00:36:57
looks like
00:36:59
this, so it wasn’t Ross who actually
00:37:02
once did the business, by the way, it was
00:37:06
specifically on May 9, 1995, which
00:37:10
means the first one came out, there was a
00:37:14
Komtek exhibition at Presnya and the first
00:37:17
issue of the magazine came out,
00:37:19
squeak, which means that on the cover there is my
00:37:21
face and an article, a neural network, a
00:37:24
financier’s weapon, here in May everyone is at the dacha,
00:37:28
here I am still an active Major, which means they
00:37:31
’re calling me Well, we had a system for such an
00:37:34
emergency notification, that’s what a person
00:37:37
if something really happened It’s not what happened, you
00:37:39
can still find him wherever he’s
00:37:41
resting, so a colleague comes to my dacha there and
00:37:44
says, Listen, some garbage
00:37:46
is looking for you. The man on duty did what he
00:37:48
did there, I don’t know, so I’m going to Konakov,
00:37:52
so I’m calling, I’m saying that’s the major, yes
00:37:55
he is. he says, what have you done, I say,
00:37:57
What are two banks looking for from you? Which
00:37:58
Inkombank and Avtobank are both? Okay, I
00:38:01
’ll wait, I’m coming back from the dacha,
00:38:05
two banks
00:38:07
like Masalovich are calling, yes, you wrote an article,
00:38:10
Yes, you understand this. I say, well, in
00:38:11
general, I studied in the States and my report was bought by
00:38:14
the university of los angeles on nstm then
00:38:16
I already understood them a little, so
00:38:20
you can help us. How much does it cost? I’m
00:38:24
estimating the program that they gave me: 50
00:38:26
dollars, my efforts cost 200 dollars,
00:38:29
well then the programmer’s monthly salary
00:38:31
was 15 dollars, I was the head of the department,
00:38:33
I have a salary was 200, which means Well,
00:38:36
accordingly, the total is 250 I’m talking about
00:38:38
1500, I’m talking about not a question at all,
00:38:40
yeah So on the second day
00:38:44
some bank calls there, you wrote this
00:38:46
Yes, you understand this Yes,
00:38:48
someone put it in Russia I say inkombank
00:38:50
Autobank they tell us enough
00:38:53
by the way, how much does it cost 1500, and then I
00:38:57
became
00:38:59
VAT-free. In total, in 50 days, 50 bank
00:39:03
clients. That is, after a month I realized that
00:39:05
I was going to die, I understood my eyes, I saw that I have a
00:39:07
company in Stoleshnikov, yeah, there, 400 meters
00:39:10
from the Kremlin, that’s complete and a
00:39:14
collection of 80 types of neural networks, there are
00:39:18
100 types of all kinds of analytical programs,
00:39:20
different there, situational modeling,
00:39:23
this is system dynamics of risk assessment, there is
00:39:26
fuzzy logic, fuzzy algebra, that’s all,
00:39:29
dealers, in my opinion, are in children’s regions.
00:39:33
That is business. So thanks to
00:39:35
neural networks, the business got knocked up just like that, well.
00:39:37
True, the next step was sad. I
00:39:40
even talked about it once, in my opinion, there was
00:39:42
even a series on Cyber. In
00:39:44
1997, two people actually came to me.
00:39:46
By that time, that is, the
00:39:50
market for neural networks had been built. That is,
00:39:52
I had a product
00:39:54
called such a simple Academic on
00:39:58
It’s very good. By the way, it’s still
00:39:59
alive on it. It’s good to study How the
00:40:01
neural network works, how it works in parallel, there
00:40:04
were special programs There Neuro
00:40:06
Shell Nerey for traders, it turned out that these are the
00:40:08
most crazy people with money
00:40:11
who really need these [ __ ] High
00:40:13
technology is the stock market
00:40:14
traders speculators who we need to
00:40:17
quickly, quickly, which means
00:40:19
short-term forecasts there, how to raise
00:40:21
money without raising your ass But that’s it,
00:40:27
everything was fine with us and
00:40:31
two Doctors came, one even a professor from the
00:40:34
Institute of Prosthetics says Listen,
00:40:36
there is a task that looks like this
00:40:38
Judging by the description of the neural network, they can
00:40:40
to help, and at that time I was already
00:40:43
diligently pushing this program to doctors,
00:40:47
by the way, even now, if after 30 years you
00:40:49
raise all kinds of scientific medical material in the city,
00:40:54
layer any dissertations, there will be a
00:40:58
link to the BME package and here’s to my first
00:41:00
articles, what the hell are they
00:41:03
doing? no need to wait
00:41:05
202 no need to wait until they come up with a
00:41:07
transformer So they do it like this, that’s
00:41:10
the problem, so they came the problem is a
00:41:14
petal mine then they called it Well,
00:41:16
that’s an inhumane mine on that palm,
00:41:20
then they called it the dragon’s tooth and
00:41:22
were famous for it, mostly the Americans
00:41:24
suffered there Vietnam Vietnam Laos
00:41:30
Cambodia Southeast
00:41:32
Asia So the
00:41:34
doctors said that there is a problem there,
00:41:38
crap tears off half of the foot, they seem to know
00:41:41
how to cope with the injury, they know, but
00:41:44
the blood supply is disrupted Well, since the
00:41:46
arteries have now been disrupted in a different way, the veins are
00:41:49
disrupted, the blood supply is coronary
00:41:51
heart disease, high blood pressure, heart attacks
00:41:55
there in 3 -4 years, a very high
00:41:57
probability of death, here are
00:42:01
two ways, the first one can guide a person,
00:42:05
that is, once a week he must come
00:42:06
for an examination, he slowly
00:42:08
tells him what to do next or
00:42:11
guess the treatment plan, there are several
00:42:13
such standardized treatment plans,
00:42:16
you just need to guess which one is suitable for this person the
00:42:17
second method is 600 times cheaper than
00:42:21
600,
00:42:23
so he says, Can you help with anything? I
00:42:25
say, let’s try, they collected
00:42:27
there, in my opinion, they didn’t collect 200 examples, which
00:42:29
means they were so detailed, they were divided into a
00:42:31
bunch of rental parameters. So they come and
00:42:35
say, Listen to the mysticism, it gives 85%
00:42:38
accuracy. That is this is not 100,
00:42:40
but if I have this hint in my hands
00:42:42
and I begin to lead a person
00:42:44
using this method, he should come to me
00:42:46
First, well, more than once a week,
00:42:49
let’s say once a month, then less often Well, in
00:42:52
general, this is
00:42:53
the truth, the truth of salvation, so I
00:42:58
raised Nose put together this program there,
00:43:01
remembered the remains of English, so he
00:43:04
went to Hanover and put it up at the
00:43:07
Tsebro exhibition, and
00:43:10
the Europeans came up and so they played it.
00:43:19
can tell an experienced doctor Are you
00:43:22
crazy? How do you say neural network ha
00:43:24
You also You also say that a self-driving
00:43:26
car will appear there ha-ha-ha
00:43:29
Well then I say Listen This is a product
00:43:31
that works, there is a conclusion from
00:43:33
doctors who say damn it works
00:43:35
for me there on the site there are about five of their
00:43:37
scientific works where they described it all.
00:43:40
So I say it works. They say,
00:43:42
but you chose the wrong topic, now in the
00:43:44
ninety-seventh year at the end of the year there will be a
00:43:46
conference of the Atavdas
00:43:56
really
00:43:59
[music] the
00:44:04
Atavdas have
00:44:12
now really destroyed them and we give 1
00:44:16
euro for one mine came Fraternal
00:44:19
Ukraine said We all found 2 million we
00:44:21
received 2 million euros they said they destroyed it
00:44:24
in a year they said listen we looked
00:44:28
and there are three times You can look at
00:44:32
this very European Commission means about this
00:44:34
dynamics of destruction I followed it
00:44:36
because I myself was offended Damn,
00:44:38
here is a program that is needed, here is a task
00:44:41
which, by the way, even now
00:44:43
30 years have passed, I think that this program
00:44:46
would help even now Although it can be
00:44:48
greatly improved there These are some
00:44:51
long side memories In short, no,
00:44:54
they helped me myself in I
00:44:57
don’t believe in artificial intelligence, just, well, more accurately, I believe,
00:44:59
but I’m replacing the word artificial with
00:45:01
fake artificial intelligence, the planet won’t be
00:45:04
taken over by noms, we’ve already discussed a cool
00:45:08
video of how people push
00:45:11
this Yandex delivery robot out of a snowdrift,
00:45:15
apparently he was on his way to take over the planet, but
00:45:19
as usual, he got stuck in the snow in Russia
00:45:22
which often happens with everyone else, such a
00:45:26
question is not directly related to the topic.
00:45:30
However, you are good
00:45:33
at predicting the future, as we
00:45:36
already understood from your reports on the pad
00:45:39
ten years ago, and so on. And the
00:45:41
question is:
00:45:42
What will children play in 20-30 years from now?
00:45:51
God forbid, I once sincerely believe that the skull
00:45:56
Each of us will have a five-liter
00:45:58
jar of formaldehyde, there will be a brain,
00:46:00
tentacles and a
00:46:01
smartphone,
00:46:03
only these closest people
00:46:05
will be placed next to them so that they can
00:46:07
tickle them, and for military pensioners, I
00:46:10
hoped instead of formaldehyde they would
00:46:12
give alcohol right now I see that there are no There
00:46:15
people will be people I think that, firstly, it
00:46:18
will become fashionable and expensive to return to
00:46:24
Ren pole
00:46:27
really real detox here is digital
00:46:30
detox where there is no That is, it’s
00:46:33
expensive, well, real communication paper
00:46:36
paper books That is, it seems to me
00:46:38
Now, well, I don’t
00:46:41
know As far as, well, let’s say,
00:46:44
over the next five years, these are the trends that
00:46:45
will definitely happen. That’s exactly the trick, the trick is
00:46:50
to return to real reality. Well, for
00:46:52
example, my youngest son is now a
00:46:55
friend in Ireland so that they
00:46:58
can find him rare real vinyl records there and
00:47:01
give him that because he
00:47:04
feels cool there
00:47:06
he was given cool
00:47:07
acoustic equipment with
00:47:10
records for the last 15 years, it
00:47:12
never occurred to me that children would be
00:47:14
interested in this and not in squirrels,
00:47:18
maybe I hope that eternal values ​​will return
00:47:21
there. Well, for example, here I am sincerely
00:47:24
speaking about the main Primacy of information
00:47:28
war is kindness and ignore will return
00:47:30
kindness really when I thought I
00:47:33
can name a dozen even more companies
00:47:35
that made good games then they started
00:47:38
making Borodi shooters and went bankrupt And I
00:47:40
can say Masha and the Bear she is tearing up
00:47:43
the ratings she is kind, that is,
00:47:45
good normal fairy tales will appear now, I
00:47:47
was there this morning in the team that
00:47:50
makes the electronic image of Leo Tolstoy,
00:47:54
by the way, they already did it, it
00:47:56
turned out that he has quite a
00:47:57
lot of clever phrases and not so many of these
00:48:00
under the name Well, all these
00:48:04
strange jokes
00:48:08
or some strange predictions,
00:48:11
they are just very widely
00:48:14
replicated. now they will make
00:48:17
an electronic Liv Tolstoy so that he
00:48:18
will talk to us, but
00:48:20
they really cried that everything is bad because it
00:48:24
turned out that grandfather Leo
00:48:26
Tolstoy is kind, the tail is the church, there is the tail, some
00:48:29
foundations of the state are bureaucracy,
00:48:33
so he needs to be carefully Give him a
00:48:36
platform nevertheless Well, well, so According to
00:48:41
forecasts, I hope that a bridge
00:48:44
between generations will appear, that is,
00:48:46
some kind of fairy tales of the digital forest will appear and children
00:48:48
will begin to be taught the basics of digital hygiene. Well,
00:48:51
instill in them
00:48:53
some rules of the game and and how to
00:48:56
say this. Well, combat readiness or something. Well, at
00:48:59
least so that they are in good shape, that is, although
00:49:02
they would feel that they need to be
00:49:04
on guard when you wander into this digital
00:49:06
forest, otherwise a digital bear will devour you
00:49:09
or a digital
00:49:12
fox will throw you in there, in short, re-read Pinocchio’s fairy tale
00:49:16
everywhere Add the word digital
00:49:20
there, digital currency on the digital Field of
00:49:22
Miracles, that’s all, you’ll already come across right-wing fairy tales
00:49:26
I come across people who write to
00:49:28
children, they
00:49:29
like it So, well, Andrei Ivich
00:49:32
Thank you Thank you, everything seems to have turned out
00:49:36
well, they didn’t scare me, write and
00:49:39
read fairy tales from the digital forest, keep an eye on
00:49:43
[music]
00:49:47
children

Description:

Как ИИ может навредить ребенку, студенту или пожилому человеку? Какие возможности появились у кибераферистов, черных пиарщиков и «звонил» с появлением нейросетей? В какие игры будут играть дети через 20-30 лет? Обсудили и помечтали о добром будущем с экспертом по информационной безопасности Масаловичем Андреем Игоревичем. Внимание: Редакция Точки сборки приняла решение об объединении каналов «Точка сборки» и «Радио Аврора 6.0» в Дзене. Ищите нас там по ссылке: https://dzen.ru/aurora_network

Preparing download options

popular icon
Popular
hd icon
HD video
audio icon
Only sound
total icon
All
* — If the video is playing in a new tab, go to it, then right-click on the video and select "Save video as..."
** — Link intended for online playback in specialized players

Questions about downloading video

mobile menu iconHow can I download "Как бороться с фейками, аферистами и воровством персональных данных" video?mobile menu icon

  • http://unidownloader.com/ website is the best way to download a video or a separate audio track if you want to do without installing programs and extensions.

  • The UDL Helper extension is a convenient button that is seamlessly integrated into YouTube, Instagram and OK.ru sites for fast content download.

  • UDL Client program (for Windows) is the most powerful solution that supports more than 900 websites, social networks and video hosting sites, as well as any video quality that is available in the source.

  • UDL Lite is a really convenient way to access a website from your mobile device. With its help, you can easily download videos directly to your smartphone.

mobile menu iconWhich format of "Как бороться с фейками, аферистами и воровством персональных данных" video should I choose?mobile menu icon

  • The best quality formats are FullHD (1080p), 2K (1440p), 4K (2160p) and 8K (4320p). The higher the resolution of your screen, the higher the video quality should be. However, there are other factors to consider: download speed, amount of free space, and device performance during playback.

mobile menu iconWhy does my computer freeze when loading a "Как бороться с фейками, аферистами и воровством персональных данных" video?mobile menu icon

  • The browser/computer should not freeze completely! If this happens, please report it with a link to the video. Sometimes videos cannot be downloaded directly in a suitable format, so we have added the ability to convert the file to the desired format. In some cases, this process may actively use computer resources.

mobile menu iconHow can I download "Как бороться с фейками, аферистами и воровством персональных данных" video to my phone?mobile menu icon

  • You can download a video to your smartphone using the website or the PWA application UDL Lite. It is also possible to send a download link via QR code using the UDL Helper extension.

mobile menu iconHow can I download an audio track (music) to MP3 "Как бороться с фейками, аферистами и воровством персональных данных"?mobile menu icon

  • The most convenient way is to use the UDL Client program, which supports converting video to MP3 format. In some cases, MP3 can also be downloaded through the UDL Helper extension.

mobile menu iconHow can I save a frame from a video "Как бороться с фейками, аферистами и воровством персональных данных"?mobile menu icon

  • This feature is available in the UDL Helper extension. Make sure that "Show the video snapshot button" is checked in the settings. A camera icon should appear in the lower right corner of the player to the left of the "Settings" icon. When you click on it, the current frame from the video will be saved to your computer in JPEG format.

mobile menu iconWhat's the price of all this stuff?mobile menu icon

  • It costs nothing. Our services are absolutely free for all users. There are no PRO subscriptions, no restrictions on the number or maximum length of downloaded videos.