{"id":13321,"date":"2024-07-07T13:33:46","date_gmt":"2024-07-07T13:33:46","guid":{"rendered":"https:\/\/dailyai.com\/?p=13321"},"modified":"2024-07-07T18:04:47","modified_gmt":"2024-07-07T18:04:47","slug":"openai-data-breach-what-we-know-risks-and-lessons-for-the-future","status":"publish","type":"post","link":"https:\/\/dailyai.com\/fr\/2024\/07\/openai-data-breach-what-we-know-risks-and-lessons-for-the-future\/","title":{"rendered":"Violation des donn\u00e9es de l'OpenAI : ce que nous savons, les risques et les le\u00e7ons pour l'avenir"},"content":{"rendered":"<p><b>Une faille de s\u00e9curit\u00e9 \u00e0 l'OpenAI a r\u00e9v\u00e9l\u00e9 que les entreprises d'IA sont des cibles lucratives pour les pirates informatiques.\u00a0<\/b><\/p>\n<p><span style=\"font-weight: 400;\">La violation, qui s'est produite au d\u00e9but de l'ann\u00e9e derni\u00e8re et a \u00e9t\u00e9 <\/span><a href=\"https:\/\/www.nytimes.com\/2024\/07\/04\/technology\/openai-hack.html\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">r\u00e9cemment rapport\u00e9<\/span><\/a><span style=\"font-weight: 400;\"> par le New York Times, un pirate informatique a acc\u00e9d\u00e9 aux syst\u00e8mes de messagerie interne de l'entreprise.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Le pirate a obtenu des d\u00e9tails sur les discussions des employ\u00e9s concernant les derni\u00e8res technologies d'OpenAI. <\/span>Voici ce que nous savons :<\/p>\n<ul>\n<li class=\"whitespace-normal break-words\">La violation s'est produite au d\u00e9but de l'ann\u00e9e derni\u00e8re et un pirate informatique a acc\u00e9d\u00e9 aux syst\u00e8mes de messagerie internes d'OpenAI.<\/li>\n<li class=\"whitespace-normal break-words\">Le pirate s'est infiltr\u00e9 dans un forum en ligne o\u00f9 les employ\u00e9s d'OpenAI discutaient ouvertement des derni\u00e8res technologies et d\u00e9veloppements de l'entreprise en mati\u00e8re d'IA.<\/li>\n<li class=\"whitespace-normal break-words\">La faille a r\u00e9v\u00e9l\u00e9 des discussions internes entre chercheurs et employ\u00e9s, mais n'a pas compromis le code des syst\u00e8mes d'IA d'OpenAI ni les donn\u00e9es des clients.<\/li>\n<li class=\"whitespace-normal break-words\">Les dirigeants d'OpenAI ont r\u00e9v\u00e9l\u00e9 l'incident aux employ\u00e9s lors d'une r\u00e9union g\u00e9n\u00e9rale dans les bureaux de l'entreprise \u00e0 San Francisco en avril 2023 et en ont inform\u00e9 le conseil d'administration.<\/li>\n<li class=\"whitespace-normal break-words\">L'entreprise a choisi de ne pas divulguer publiquement la faille, estimant qu'aucune information concernant des clients ou des partenaires n'avait \u00e9t\u00e9 d\u00e9rob\u00e9e et que le pirate \u00e9tait une personne priv\u00e9e n'ayant aucun lien connu avec un gouvernement \u00e9tranger.<\/li>\n<li class=\"whitespace-normal break-words\">Leopold Aschenbrenner, ancien responsable du programme technique d'OpenAI, a envoy\u00e9 une note au conseil d'administration de l'entreprise \u00e0 la suite de la violation, arguant qu'OpenAI ne faisait pas assez pour emp\u00eacher les gouvernements \u00e9trangers de voler ses secrets.<\/li>\n<li class=\"whitespace-normal break-words\">M. Aschenbrenner, qui affirme avoir \u00e9t\u00e9 licenci\u00e9 pour avoir divulgu\u00e9 des informations \u00e0 l'ext\u00e9rieur de l'entreprise, a d\u00e9clar\u00e9 dans un r\u00e9cent podcast que les mesures de s\u00e9curit\u00e9 d'OpenAI \u00e9taient insuffisantes pour se prot\u00e9ger contre le vol de secrets essentiels par des acteurs \u00e9trangers.<\/li>\n<li class=\"whitespace-normal break-words\">OpenAI a contest\u00e9 la description faite par M. Aschenbrenner de l'incident et de ses mesures de s\u00e9curit\u00e9, affirmant que ses pr\u00e9occupations n'ont pas conduit \u00e0 sa s\u00e9paration de l'entreprise.<\/li>\n<\/ul>\n<h2>Qui est Leopold Aschenbrenner ?<\/h2>\n<p class=\"whitespace-pre-wrap break-words\">Leopold Aschenbrenner est un ancien chercheur en s\u00e9curit\u00e9 d'OpenAI, membre de l'\u00e9quipe de superalignement de l'entreprise.<\/p>\n<p class=\"whitespace-pre-wrap break-words\">L'\u00e9quipe \"superalignement\" s'int\u00e9resse \u00e0 la s\u00e9curit\u00e9 \u00e0 long terme de l'intelligence artificielle g\u00e9n\u00e9rale (AGI) avanc\u00e9e, <a href=\"https:\/\/dailyai.com\/fr\/2024\/05\/openais-superalignment-meltdown-can-the-company-salvage-any-trust\/\">s'est r\u00e9cemment effondr\u00e9<\/a> lorsque plusieurs chercheurs de renom ont quitt\u00e9 l'entreprise.<\/p>\n<p>Parmi eux, le cofondateur d'OpenAI, Ilya Sutskever, qui <a href=\"https:\/\/dailyai.com\/fr\/2024\/06\/openai-co-founder-ilya-sutskever-launches-new-startup-safe-superintelligence-inc\/\">a r\u00e9cemment cr\u00e9\u00e9 une nouvelle soci\u00e9t\u00e9<\/a> nomm\u00e9 Safe Superintelligence Inc.<\/p>\n<p class=\"whitespace-pre-wrap break-words\">L'ann\u00e9e derni\u00e8re, M. Aschenbrenner a r\u00e9dig\u00e9 un m\u00e9mo interne dans lequel il fait part de ses pr\u00e9occupations concernant les pratiques d'OpenAI en mati\u00e8re de s\u00e9curit\u00e9, qu'il qualifie de \"manifestement insuffisantes\".<\/p>\n<p class=\"whitespace-pre-wrap break-words\">Il a fait circuler le m\u00e9mo parmi des experts r\u00e9put\u00e9s en dehors de l'entreprise. Quelques semaines plus tard, OpenAI a \u00e9t\u00e9 victime d'une violation de donn\u00e9es, et il a donc partag\u00e9 une version mise \u00e0 jour avec les membres du conseil d'administration. Peu apr\u00e8s, il a \u00e9t\u00e9 licenci\u00e9 d'OpenAI.<\/p>\n<p class=\"whitespace-pre-wrap break-words\">\"Les questions portaient sur mon point de vue sur les progr\u00e8s de l'IA, sur l'AGI, sur le niveau de s\u00e9curit\u00e9 appropri\u00e9 pour l'AGI, sur la question de savoir si le gouvernement devrait \u00eatre impliqu\u00e9 dans l'AGI, si moi et l'\u00e9quipe de superalignement \u00e9tions loyaux envers l'entreprise, et sur ce que je faisais pendant les r\u00e9unions du conseil d'administration d'OpenAI\", a r\u00e9v\u00e9l\u00e9 M. Aschenbrenner lors d'un podcast.<\/p>\n<p class=\"whitespace-pre-wrap break-words\">\"Autre exemple : lorsque je soulevais des questions de s\u00e9curit\u00e9, ils me disaient que la s\u00e9curit\u00e9 \u00e9tait notre priorit\u00e9 absolue\", a d\u00e9clar\u00e9 M. Aschenbrenner. \"Invariablement, lorsqu'il s'agissait d'investir des ressources importantes ou de faire des compromis pour prendre des mesures de base, la s\u00e9curit\u00e9 n'\u00e9tait pas prioritaire.\"<\/p>\n<p class=\"whitespace-pre-wrap break-words\">OpenAI a contest\u00e9 la description faite par M. Aschenbrenner de l'incident et de ses mesures de s\u00e9curit\u00e9. \"Nous appr\u00e9cions les pr\u00e9occupations que Leopold a soulev\u00e9es pendant qu'il travaillait pour OpenAI, et cela n'a pas conduit \u00e0 sa s\u00e9paration\", a r\u00e9pondu Liz Bourgeois, porte-parole d'OpenAI.<\/p>\n<p class=\"whitespace-pre-wrap break-words\">\"Bien que nous partagions son engagement \u00e0 construire un I.G.A. s\u00fbr, nous ne sommes pas d'accord avec les nombreuses affirmations qu'il a faites depuis lors au sujet de notre travail\".<\/p>\n<h2>Les entreprises sp\u00e9cialis\u00e9es dans l'IA deviennent la cible de pirates informatiques<\/h2>\n<p><span style=\"font-weight: 400;\">Les entreprises sp\u00e9cialis\u00e9es dans l'IA constituent sans aucun doute une cible attrayante pour les pirates informatiques en raison du volume colossal de donn\u00e9es pr\u00e9cieuses dont elles d\u00e9tiennent les cl\u00e9s.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Ces donn\u00e9es se r\u00e9partissent en trois cat\u00e9gories principales : les ensembles de donn\u00e9es de formation de haute qualit\u00e9, les enregistrements d'interaction avec les utilisateurs et les informations sensibles sur les clients.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Il suffit de consid\u00e9rer la valeur de n'importe laquelle de ces cat\u00e9gories. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Tout d'abord, les donn\u00e9es de formation sont le nouveau p\u00e9trole. Bien qu'il soit relativement facile d'extraire certaines donn\u00e9es de bases de donn\u00e9es publiques telles que le <a href=\"https:\/\/dailyai.com\/fr\/2023\/12\/stanford-researchers-identify-illicit-child-imagery-in-the-laion-dataset\/\">LAION<\/a>Elle doit \u00eatre v\u00e9rifi\u00e9e, nettoy\u00e9e et augment\u00e9e. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Il s'agit d'une activit\u00e9 \u00e0 forte intensit\u00e9 de main-d'\u0153uvre. <\/span><span style=\"font-weight: 400;\">Les entreprises sp\u00e9cialis\u00e9es dans l'IA ont <a href=\"https:\/\/dailyai.com\/fr\/2023\/08\/kenyan-ai-content-moderators-petition-the-government-over-traumatic-working-conditions\/\">de gros contrats<\/a> avec des soci\u00e9t\u00e9s de donn\u00e9es qui fournissent ces services en Afrique, en Asie et en Am\u00e9rique du Sud.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Ensuite, il faut prendre en compte les donn\u00e9es que les entreprises d'IA collectent aupr\u00e8s des utilisateurs.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Ces informations sont particuli\u00e8rement pr\u00e9cieuses pour les pirates informatiques si l'on consid\u00e8re les informations financi\u00e8res, le code et d'autres formes de propri\u00e9t\u00e9 intellectuelle que les entreprises peuvent partager avec les outils d'IA.\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/resources.menlosecurity.com\/reports\/the-continued-impact-of-generative-ai-on-security-posture\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Un r\u00e9cent rapport sur la cybers\u00e9curit\u00e9<\/span><\/a><span style=\"font-weight: 400;\"> a constat\u00e9 que plus de la moiti\u00e9 des interactions des personnes avec des chatbots comme ChatGPT comprennent des informations sensibles et personnellement identifiables (PII). Une autre \u00e9tude a r\u00e9v\u00e9l\u00e9 que <\/span><a href=\"https:\/\/www.cyberhaven.com\/blog\/4-2-of-workers-have-pasted-company-data-into-chatgpt\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">11% de salari\u00e9s<\/span><\/a><span style=\"font-weight: 400;\"> partager des informations commerciales confidentielles avec ChatGPT.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">De plus, comme de plus en plus d'entreprises int\u00e8grent des outils d'IA dans leurs op\u00e9rations, elles doivent souvent accorder l'acc\u00e8s \u00e0 leurs bases de donn\u00e9es internes, ce qui accro\u00eet encore les risques de s\u00e9curit\u00e9.\u00a0<\/span><\/p>\n<p>En somme, il s'agit d'un fardeau \u00e9norme pour les entreprises sp\u00e9cialis\u00e9es dans l'IA. Et comme<span style=\"font-weight: 400;\"> la course aux armements dans le domaine de l'IA s'intensifie, et des pays comme la Chine comblent rapidement leur retard sur les \u00c9tats-Unis, la surface de la menace ne fera que s'\u00e9tendre.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Au-del\u00e0 de ces murmures \u00e9manant d'OpenAI, nous n'avons pas encore vu de preuves de br\u00e8ches importantes, mais ce n'est probablement qu'une question de temps.\u00a0<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>Une faille de s\u00e9curit\u00e9 chez OpenAI a montr\u00e9 que les entreprises d'IA sont des cibles lucratives pour les pirates informatiques.  La faille, qui s'est produite au d\u00e9but de l'ann\u00e9e derni\u00e8re et qui a \u00e9t\u00e9 r\u00e9cemment rapport\u00e9e par le New York Times, a permis \u00e0 un pirate d'acc\u00e9der aux syst\u00e8mes de messagerie interne de l'entreprise.  Le pirate a obtenu des d\u00e9tails sur les discussions des employ\u00e9s concernant les derni\u00e8res technologies d'OpenAI. Voici ce que nous savons : La violation s'est produite au d\u00e9but de l'ann\u00e9e derni\u00e8re et a impliqu\u00e9 un pirate informatique qui a acc\u00e9d\u00e9 aux syst\u00e8mes de messagerie internes d'OpenAI. Le pirate s'est infiltr\u00e9 dans un forum en ligne o\u00f9 les employ\u00e9s d'OpenAI discutaient ouvertement des derni\u00e8res technologies et d\u00e9veloppements de l'entreprise en mati\u00e8re d'IA. L'intrusion a r\u00e9v\u00e9l\u00e9 des discussions internes entre chercheurs et employ\u00e9s, mais n'a pas permis d'en savoir plus.<\/p>","protected":false},"author":2,"featured_media":13323,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[84],"tags":[365,344,93],"class_list":["post-13321","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-industry","tag-cybersecurity","tag-hacking","tag-openai"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>OpenAI data breach: what we know, risks, and lessons for the future | DailyAI<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/dailyai.com\/fr\/2024\/07\/openai-data-breach-what-we-know-risks-and-lessons-for-the-future\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"OpenAI data breach: what we know, risks, and lessons for the future | DailyAI\" \/>\n<meta property=\"og:description\" content=\"A security breach at OpenAI exposed how AI companies are lucrative targets to hackers.\u00a0 The breach, which occurred early last year and was recently reported by the New York Times, involved a hacker gaining access to the company&#8217;s internal messaging systems.\u00a0 The hacker lifted details from employee discussions about OpenAI&#8217;s latest technologies. Here&#8217;s what we know: The breach occurred early last year and involved a hacker accessing OpenAI&#8217;s internal messaging systems. The hacker infiltrated an online forum where OpenAI employees openly discussed the company&#8217;s latest AI technologies and developments. The breach exposed internal discussions among researchers and employees but did\" \/>\n<meta property=\"og:url\" content=\"https:\/\/dailyai.com\/fr\/2024\/07\/openai-data-breach-what-we-know-risks-and-lessons-for-the-future\/\" \/>\n<meta property=\"og:site_name\" content=\"DailyAI\" \/>\n<meta property=\"article:published_time\" content=\"2024-07-07T13:33:46+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-07T18:04:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/dailyai.com\/wp-content\/uploads\/2024\/07\/DALL\u00b7E-2024-07-07-14.32.47-A-dramatic-scene-focused-on-cybersecurity-breaches-at-OpenAI-highlighting-security-and-geopolitical-concerns.-The-image-features-hackers-in-a-dark-ro.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1792\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Sam Jeans\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@DailyAIOfficial\" \/>\n<meta name=\"twitter:site\" content=\"@DailyAIOfficial\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sam Jeans\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"NewsArticle\",\"@id\":\"https:\\\/\\\/dailyai.com\\\/2024\\\/07\\\/openai-data-breach-what-we-know-risks-and-lessons-for-the-future\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/dailyai.com\\\/2024\\\/07\\\/openai-data-breach-what-we-know-risks-and-lessons-for-the-future\\\/\"},\"author\":{\"name\":\"Sam Jeans\",\"@id\":\"https:\\\/\\\/dailyai.com\\\/#\\\/schema\\\/person\\\/711e81f945549438e8bbc579efdeb3c9\"},\"headline\":\"OpenAI data breach: what we know, risks, and lessons for the future\",\"datePublished\":\"2024-07-07T13:33:46+00:00\",\"dateModified\":\"2024-07-07T18:04:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/dailyai.com\\\/2024\\\/07\\\/openai-data-breach-what-we-know-risks-and-lessons-for-the-future\\\/\"},\"wordCount\":840,\"publisher\":{\"@id\":\"https:\\\/\\\/dailyai.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/dailyai.com\\\/2024\\\/07\\\/openai-data-breach-what-we-know-risks-and-lessons-for-the-future\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/dailyai.com\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/DALL\u00b7E-2024-07-07-14.32.47-A-dramatic-scene-focused-on-cybersecurity-breaches-at-OpenAI-highlighting-security-and-geopolitical-concerns.-The-image-features-hackers-in-a-dark-ro.webp\",\"keywords\":[\"Cybersecurity\",\"Hacking\",\"OpenAI\"],\"articleSection\":[\"Industry\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/dailyai.com\\\/2024\\\/07\\\/openai-data-breach-what-we-know-risks-and-lessons-for-the-future\\\/\",\"url\":\"https:\\\/\\\/dailyai.com\\\/2024\\\/07\\\/openai-data-breach-what-we-know-risks-and-lessons-for-the-future\\\/\",\"name\":\"OpenAI data breach: what we know, risks, and lessons for the future | DailyAI\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/dailyai.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/dailyai.com\\\/2024\\\/07\\\/openai-data-breach-what-we-know-risks-and-lessons-for-the-future\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/dailyai.com\\\/2024\\\/07\\\/openai-data-breach-what-we-know-risks-and-lessons-for-the-future\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/dailyai.com\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/DALL\u00b7E-2024-07-07-14.32.47-A-dramatic-scene-focused-on-cybersecurity-breaches-at-OpenAI-highlighting-security-and-geopolitical-concerns.-The-image-features-hackers-in-a-dark-ro.webp\",\"datePublished\":\"2024-07-07T13:33:46+00:00\",\"dateModified\":\"2024-07-07T18:04:47+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/dailyai.com\\\/2024\\\/07\\\/openai-data-breach-what-we-know-risks-and-lessons-for-the-future\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/dailyai.com\\\/2024\\\/07\\\/openai-data-breach-what-we-know-risks-and-lessons-for-the-future\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/dailyai.com\\\/2024\\\/07\\\/openai-data-breach-what-we-know-risks-and-lessons-for-the-future\\\/#primaryimage\",\"url\":\"https:\\\/\\\/dailyai.com\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/DALL\u00b7E-2024-07-07-14.32.47-A-dramatic-scene-focused-on-cybersecurity-breaches-at-OpenAI-highlighting-security-and-geopolitical-concerns.-The-image-features-hackers-in-a-dark-ro.webp\",\"contentUrl\":\"https:\\\/\\\/dailyai.com\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/DALL\u00b7E-2024-07-07-14.32.47-A-dramatic-scene-focused-on-cybersecurity-breaches-at-OpenAI-highlighting-security-and-geopolitical-concerns.-The-image-features-hackers-in-a-dark-ro.webp\",\"width\":1792,\"height\":1024,\"caption\":\"AI security\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/dailyai.com\\\/2024\\\/07\\\/openai-data-breach-what-we-know-risks-and-lessons-for-the-future\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/dailyai.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"OpenAI data breach: what we know, risks, and lessons for the future\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/dailyai.com\\\/#website\",\"url\":\"https:\\\/\\\/dailyai.com\\\/\",\"name\":\"DailyAI\",\"description\":\"Your Daily Dose of AI News\",\"publisher\":{\"@id\":\"https:\\\/\\\/dailyai.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/dailyai.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/dailyai.com\\\/#organization\",\"name\":\"DailyAI\",\"url\":\"https:\\\/\\\/dailyai.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/dailyai.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/dailyai.com\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Daily-Ai_TL_colour.png\",\"contentUrl\":\"https:\\\/\\\/dailyai.com\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Daily-Ai_TL_colour.png\",\"width\":4501,\"height\":934,\"caption\":\"DailyAI\"},\"image\":{\"@id\":\"https:\\\/\\\/dailyai.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/DailyAIOfficial\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/dailyaiofficial\\\/\",\"https:\\\/\\\/www.youtube.com\\\/@DailyAIOfficial\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/dailyai.com\\\/#\\\/schema\\\/person\\\/711e81f945549438e8bbc579efdeb3c9\",\"name\":\"Sam Jeans\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a24a4a8f8e2a1a275b7491dc9c9f032c401eabf23c3206da4628dc84b6dac5c8?s=96&d=robohash&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a24a4a8f8e2a1a275b7491dc9c9f032c401eabf23c3206da4628dc84b6dac5c8?s=96&d=robohash&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a24a4a8f8e2a1a275b7491dc9c9f032c401eabf23c3206da4628dc84b6dac5c8?s=96&d=robohash&r=g\",\"caption\":\"Sam Jeans\"},\"description\":\"Sam is a science and technology writer who has worked in various AI startups. When he\u2019s not writing, he can be found reading medical journals or digging through boxes of vinyl records.\",\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/in\\\/sam-jeans-6746b9142\\\/\"],\"url\":\"https:\\\/\\\/dailyai.com\\\/fr\\\/author\\\/samjeans\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Violation des donn\u00e9es de l'OpenAI : ce que nous savons, les risques et les le\u00e7ons pour l'avenir | DailyAI","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/dailyai.com\/fr\/2024\/07\/openai-data-breach-what-we-know-risks-and-lessons-for-the-future\/","og_locale":"fr_FR","og_type":"article","og_title":"OpenAI data breach: what we know, risks, and lessons for the future | DailyAI","og_description":"A security breach at OpenAI exposed how AI companies are lucrative targets to hackers.\u00a0 The breach, which occurred early last year and was recently reported by the New York Times, involved a hacker gaining access to the company&#8217;s internal messaging systems.\u00a0 The hacker lifted details from employee discussions about OpenAI&#8217;s latest technologies. Here&#8217;s what we know: The breach occurred early last year and involved a hacker accessing OpenAI&#8217;s internal messaging systems. The hacker infiltrated an online forum where OpenAI employees openly discussed the company&#8217;s latest AI technologies and developments. The breach exposed internal discussions among researchers and employees but did","og_url":"https:\/\/dailyai.com\/fr\/2024\/07\/openai-data-breach-what-we-know-risks-and-lessons-for-the-future\/","og_site_name":"DailyAI","article_published_time":"2024-07-07T13:33:46+00:00","article_modified_time":"2024-07-07T18:04:47+00:00","og_image":[{"width":1792,"height":1024,"url":"https:\/\/dailyai.com\/wp-content\/uploads\/2024\/07\/DALL\u00b7E-2024-07-07-14.32.47-A-dramatic-scene-focused-on-cybersecurity-breaches-at-OpenAI-highlighting-security-and-geopolitical-concerns.-The-image-features-hackers-in-a-dark-ro.webp","type":"image\/webp"}],"author":"Sam Jeans","twitter_card":"summary_large_image","twitter_creator":"@DailyAIOfficial","twitter_site":"@DailyAIOfficial","twitter_misc":{"\u00c9crit par":"Sam Jeans","Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"NewsArticle","@id":"https:\/\/dailyai.com\/2024\/07\/openai-data-breach-what-we-know-risks-and-lessons-for-the-future\/#article","isPartOf":{"@id":"https:\/\/dailyai.com\/2024\/07\/openai-data-breach-what-we-know-risks-and-lessons-for-the-future\/"},"author":{"name":"Sam Jeans","@id":"https:\/\/dailyai.com\/#\/schema\/person\/711e81f945549438e8bbc579efdeb3c9"},"headline":"OpenAI data breach: what we know, risks, and lessons for the future","datePublished":"2024-07-07T13:33:46+00:00","dateModified":"2024-07-07T18:04:47+00:00","mainEntityOfPage":{"@id":"https:\/\/dailyai.com\/2024\/07\/openai-data-breach-what-we-know-risks-and-lessons-for-the-future\/"},"wordCount":840,"publisher":{"@id":"https:\/\/dailyai.com\/#organization"},"image":{"@id":"https:\/\/dailyai.com\/2024\/07\/openai-data-breach-what-we-know-risks-and-lessons-for-the-future\/#primaryimage"},"thumbnailUrl":"https:\/\/dailyai.com\/wp-content\/uploads\/2024\/07\/DALL\u00b7E-2024-07-07-14.32.47-A-dramatic-scene-focused-on-cybersecurity-breaches-at-OpenAI-highlighting-security-and-geopolitical-concerns.-The-image-features-hackers-in-a-dark-ro.webp","keywords":["Cybersecurity","Hacking","OpenAI"],"articleSection":["Industry"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/dailyai.com\/2024\/07\/openai-data-breach-what-we-know-risks-and-lessons-for-the-future\/","url":"https:\/\/dailyai.com\/2024\/07\/openai-data-breach-what-we-know-risks-and-lessons-for-the-future\/","name":"Violation des donn\u00e9es de l'OpenAI : ce que nous savons, les risques et les le\u00e7ons pour l'avenir | DailyAI","isPartOf":{"@id":"https:\/\/dailyai.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/dailyai.com\/2024\/07\/openai-data-breach-what-we-know-risks-and-lessons-for-the-future\/#primaryimage"},"image":{"@id":"https:\/\/dailyai.com\/2024\/07\/openai-data-breach-what-we-know-risks-and-lessons-for-the-future\/#primaryimage"},"thumbnailUrl":"https:\/\/dailyai.com\/wp-content\/uploads\/2024\/07\/DALL\u00b7E-2024-07-07-14.32.47-A-dramatic-scene-focused-on-cybersecurity-breaches-at-OpenAI-highlighting-security-and-geopolitical-concerns.-The-image-features-hackers-in-a-dark-ro.webp","datePublished":"2024-07-07T13:33:46+00:00","dateModified":"2024-07-07T18:04:47+00:00","breadcrumb":{"@id":"https:\/\/dailyai.com\/2024\/07\/openai-data-breach-what-we-know-risks-and-lessons-for-the-future\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/dailyai.com\/2024\/07\/openai-data-breach-what-we-know-risks-and-lessons-for-the-future\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/dailyai.com\/2024\/07\/openai-data-breach-what-we-know-risks-and-lessons-for-the-future\/#primaryimage","url":"https:\/\/dailyai.com\/wp-content\/uploads\/2024\/07\/DALL\u00b7E-2024-07-07-14.32.47-A-dramatic-scene-focused-on-cybersecurity-breaches-at-OpenAI-highlighting-security-and-geopolitical-concerns.-The-image-features-hackers-in-a-dark-ro.webp","contentUrl":"https:\/\/dailyai.com\/wp-content\/uploads\/2024\/07\/DALL\u00b7E-2024-07-07-14.32.47-A-dramatic-scene-focused-on-cybersecurity-breaches-at-OpenAI-highlighting-security-and-geopolitical-concerns.-The-image-features-hackers-in-a-dark-ro.webp","width":1792,"height":1024,"caption":"AI security"},{"@type":"BreadcrumbList","@id":"https:\/\/dailyai.com\/2024\/07\/openai-data-breach-what-we-know-risks-and-lessons-for-the-future\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/dailyai.com\/"},{"@type":"ListItem","position":2,"name":"OpenAI data breach: what we know, risks, and lessons for the future"}]},{"@type":"WebSite","@id":"https:\/\/dailyai.com\/#website","url":"https:\/\/dailyai.com\/","name":"DailyAI","description":"Votre dose quotidienne de nouvelles sur l'IA","publisher":{"@id":"https:\/\/dailyai.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/dailyai.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/dailyai.com\/#organization","name":"DailyAI","url":"https:\/\/dailyai.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/dailyai.com\/#\/schema\/logo\/image\/","url":"https:\/\/dailyai.com\/wp-content\/uploads\/2023\/06\/Daily-Ai_TL_colour.png","contentUrl":"https:\/\/dailyai.com\/wp-content\/uploads\/2023\/06\/Daily-Ai_TL_colour.png","width":4501,"height":934,"caption":"DailyAI"},"image":{"@id":"https:\/\/dailyai.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/DailyAIOfficial","https:\/\/www.linkedin.com\/company\/dailyaiofficial\/","https:\/\/www.youtube.com\/@DailyAIOfficial"]},{"@type":"Person","@id":"https:\/\/dailyai.com\/#\/schema\/person\/711e81f945549438e8bbc579efdeb3c9","name":"Sam Jeans","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/a24a4a8f8e2a1a275b7491dc9c9f032c401eabf23c3206da4628dc84b6dac5c8?s=96&d=robohash&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/a24a4a8f8e2a1a275b7491dc9c9f032c401eabf23c3206da4628dc84b6dac5c8?s=96&d=robohash&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a24a4a8f8e2a1a275b7491dc9c9f032c401eabf23c3206da4628dc84b6dac5c8?s=96&d=robohash&r=g","caption":"Sam Jeans"},"description":"Sam est un r\u00e9dacteur scientifique et technologique qui a travaill\u00e9 dans diverses start-ups sp\u00e9cialis\u00e9es dans l'IA. Lorsqu'il n'\u00e9crit pas, on peut le trouver en train de lire des revues m\u00e9dicales ou de fouiller dans des bo\u00eetes de disques vinyles.","sameAs":["https:\/\/www.linkedin.com\/in\/sam-jeans-6746b9142\/"],"url":"https:\/\/dailyai.com\/fr\/author\/samjeans\/"}]}},"_links":{"self":[{"href":"https:\/\/dailyai.com\/fr\/wp-json\/wp\/v2\/posts\/13321","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dailyai.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dailyai.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dailyai.com\/fr\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/dailyai.com\/fr\/wp-json\/wp\/v2\/comments?post=13321"}],"version-history":[{"count":12,"href":"https:\/\/dailyai.com\/fr\/wp-json\/wp\/v2\/posts\/13321\/revisions"}],"predecessor-version":[{"id":13335,"href":"https:\/\/dailyai.com\/fr\/wp-json\/wp\/v2\/posts\/13321\/revisions\/13335"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dailyai.com\/fr\/wp-json\/wp\/v2\/media\/13323"}],"wp:attachment":[{"href":"https:\/\/dailyai.com\/fr\/wp-json\/wp\/v2\/media?parent=13321"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dailyai.com\/fr\/wp-json\/wp\/v2\/categories?post=13321"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dailyai.com\/fr\/wp-json\/wp\/v2\/tags?post=13321"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}