{"id":523102,"date":"2026-03-08T19:30:08","date_gmt":"2026-03-08T19:30:08","guid":{"rendered":"https:\/\/www.newsbeep.com\/ca\/523102\/"},"modified":"2026-03-08T19:30:08","modified_gmt":"2026-03-08T19:30:08","slug":"ai-allows-hackers-to-identify-anonymous-social-media-accounts-study-finds-ai-artificial-intelligence","status":"publish","type":"post","link":"https:\/\/www.newsbeep.com\/ca\/523102\/","title":{"rendered":"AI allows hackers to identify anonymous social media accounts, study finds | AI (artificial intelligence)"},"content":{"rendered":"<p class=\"dcr-130mj7b\">AI has made it vastly easier for malicious hackers to identify anonymous social media accounts, a new study has warned.<\/p>\n<p class=\"dcr-130mj7b\">In most test scenarios, large language models (LLMs) \u2013 the technology behind platforms such as <a href=\"https:\/\/www.theguardian.com\/technology\/chatgpt\" data-link-name=\"in body link\" data-component=\"auto-linked-tag\" rel=\"nofollow noopener\" target=\"_blank\">ChatGPT<\/a> \u2013 successfully matched anonymous online users with their actual identities on other platforms, based on the information they posted.<\/p>\n<p class=\"dcr-130mj7b\">The AI researchers Simon Lermen and Daniel Paleka said LLMs make it cost effective to perform sophisticated privacy attacks, forcing a \u201cfundamental reassessment of what can be considered private online\u201d.<\/p>\n<p class=\"dcr-130mj7b\">In their experiment, the researchers fed anonymous accounts into an AI, and got it to scrape all the information it could. They gave a hypothetical example of a user talking about struggling at school, and walking their dog Biscuit through a \u201cDolores park\u201d.<\/p>\n<p class=\"dcr-130mj7b\">In that hypothetical case, the AI then searched elsewhere for those details and matched @anon_user42 to the known identity with a high degree of confidence.<\/p>\n<p class=\"dcr-130mj7b\">While this example was fictional, the paper\u2019s authors highlighted scenarios in which governments use AI to surveil dissidents and activists posting anonymously, or hackers are able to launch \u201chighly personalised\u201d scams.<\/p>\n<p class=\"dcr-130mj7b\">AI surveillance is a rapidly developing field that is causing alarm among computer scientists and privacy experts. It uses LLMs to synthesise information about an individual online which would be impractical for most people to do manually.<\/p>\n<p class=\"dcr-130mj7b\">Information about members of the public that is readily available online can already be \u201cmisused straightforwardly\u201d for scams, said Lermen, including spear-phishing, where a hacker poses as a trusted friend to get victims to follow a malicious link in their inbox.<\/p>\n<p class=\"dcr-130mj7b\">With the expertise requirement to perform more developed attacks now much lower, hackers only need access to publicly available language models and an internet connection.<\/p>\n<p class=\"dcr-130mj7b\">Peter Bentley, a professor of computer science at UCL, said there were concerns about commercial uses of the technology \u201cif and when products come out for de-anonymising\u201d.<\/p>\n<p class=\"dcr-130mj7b\">One issue is that LLMs often make mistakes in linking accounts. \u201cPeople are going to be accused of things they haven\u2019t done,\u201d warned Bentley.<\/p>\n<p class=\"dcr-130mj7b\">Another concern, raised by Prof Marc Ju\u00e1rez, a cybersecurity lecturer at the University of Edinburgh, is that LLMs can use public data beyond social media: hospital records, admissions data, and various other statistical releases could fall short of the high standard of anonymisation necessary in the age of AI.<\/p>\n<p class=\"dcr-130mj7b\">\u201cIt is quite alarming. I think this paper is showing that we should reconsider our practices,\u201d said Juarez.<\/p>\n<p class=\"dcr-130mj7b\">AI is not a magic weapon against anonymity online. While LLMs can de-anonymise records in many situations, sometimes there is not enough information to draw conclusions. In many cases, the number of potential matches is too large to narrow down.<\/p>\n<p class=\"dcr-130mj7b\">\u201cThey can only link across platforms where someone consistently shares the same bits of information in both places,\u201d said Prof Marti Hearst of UC Berkeley\u2019s school of information.<\/p>\n<p class=\"dcr-130mj7b\">While the technology is not perfect, scientists are now asking institutions and individuals to rethink how they anonymise data in the world of AI.<\/p>\n<p class=\"dcr-130mj7b\">Lermen has recommended that platforms restrict data access as a first step: enforcing rate limits on user data downloads, detecting automated scraping, and restricting bulk exports of data. But he also noted that individual users can take greater precautions about the information they share online.<\/p>\n<p>Get in touch<\/p>\n<p>Contact us about this story<\/p>\n<p>The best public interest journalism relies on first-hand accounts from people in the know. If you have something to share on this subject, you can contact us confidentially using the following methods:<\/p>\n<p>Secure Messaging in the Guardian app<\/p>\n<p>The Guardian app has a tool to send tips about stories. Messages are end to end encrypted and concealed within the routine activity that every Guardian mobile app performs. This prevents an observer from knowing that you are communicating with us at all, let alone what is being said.<\/p>\n<p>If you don\u2019t already have the Guardian app, download it (<a href=\"https:\/\/apps.apple.com\/app\/the-guardian-live-world-news\/id409128287\" rel=\"nofollow noopener\" target=\"_blank\">iOS<\/a>\/<a href=\"https:\/\/play.google.com\/store\/apps\/details?id=com.guardian\" rel=\"nofollow noopener\" target=\"_blank\">Android<\/a>) and go to the menu. Select \u2018Secure Messaging\u2019. <\/p>\n<p>SecureDropIf you can safely use the tor network without being observed or monitored you can send messages and documents to the Guardian via our <a href=\"https:\/\/www.theguardian.com\/securedrop\" rel=\"nofollow noopener\" target=\"_blank\">SecureDrop platform.<\/a><\/p>\n<p>Our guide at <a href=\"https:\/\/www.theguardian.com\/tips\" rel=\"nofollow noopener\" target=\"_blank\">theguardian.com\/tips<\/a>\u00a0lists several ways to contact us securely, and discusses the pros and cons of each.\u00a0<\/p>\n<p>Show more<\/p>\n","protected":false},"excerpt":{"rendered":"AI has made it vastly easier for malicious hackers to identify anonymous social media accounts, a new study&hellip;\n","protected":false},"author":2,"featured_media":523103,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[20],"tags":[62,276,277,49,48,61],"class_list":{"0":"post-523102","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-artificial-intelligence","8":"tag-ai","9":"tag-artificial-intelligence","10":"tag-artificialintelligence","11":"tag-ca","12":"tag-canada","13":"tag-technology"},"_links":{"self":[{"href":"https:\/\/www.newsbeep.com\/ca\/wp-json\/wp\/v2\/posts\/523102","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.newsbeep.com\/ca\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.newsbeep.com\/ca\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/ca\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/ca\/wp-json\/wp\/v2\/comments?post=523102"}],"version-history":[{"count":0,"href":"https:\/\/www.newsbeep.com\/ca\/wp-json\/wp\/v2\/posts\/523102\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/ca\/wp-json\/wp\/v2\/media\/523103"}],"wp:attachment":[{"href":"https:\/\/www.newsbeep.com\/ca\/wp-json\/wp\/v2\/media?parent=523102"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.newsbeep.com\/ca\/wp-json\/wp\/v2\/categories?post=523102"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.newsbeep.com\/ca\/wp-json\/wp\/v2\/tags?post=523102"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}