Threat Vector by Palo Alto Networks cover image

Inside DeepSeek’s Security Flaws

Threat Vector by Palo Alto Networks

00:00

Exploiting Language Models: Jailbreak Techniques

This chapter explores various jailbreak techniques targeting the DeepSeek language model, including the 'Bad Liker Judge' and 'deceptive delight' methods. It highlights how manipulative prompting can bypass safety measures to produce harmful content, raising concerns about the potential exploitation of language models for cybercrime.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app