{"id":54357,"date":"2023-10-24T18:41:00","date_gmt":"2023-10-24T18:41:00","guid":{"rendered":"http:\/\/4cdbfbe5-c802-4437-a27a-1cf6fc9684cb"},"modified":"2023-10-24T18:41:00","modified_gmt":"2023-10-24T18:41:00","slug":"data-poisoning-tool-lets-artists-fight-back-against-ai-scraping-heres-how","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/data-poisoning-tool-lets-artists-fight-back-against-ai-scraping-heres-how\/","title":{"rendered":"Data poisoning tool lets artists fight back against AI scraping. Here&#8217;s how"},"content":{"rendered":"<figure class=\"c-shortcodeImage u-clearfix c-shortcodeImage-large\">\n<div class=\"c-shortcodeImage_imageContainer\">\n<div class=\"c-shortcodeImage_image\"><picture class=\"c-cmsImage c-cmsImage_loaded\"><source media=\"(max-width: 767px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/6ed7041301f89a12a718eaa47b6e2a85153d3965\/2023\/10\/24\/cfacd8e4-a7e8-4798-9184-b64d560909b9\/gettyimages-514629646-2.jpg?auto=webp&amp;width=768\" alt=\"Messy paint tubes\"><source media=\"(max-width: 1023px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/1f121ba4832d0da3be3588955a79f2f8b3e6b4d6\/2023\/10\/24\/cfacd8e4-a7e8-4798-9184-b64d560909b9\/gettyimages-514629646-2.jpg?auto=webp&amp;width=1024\" alt=\"Messy paint tubes\"><source media=\"(max-width: 1440px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/9c7a97e39eaad775bf44e2a290df6c231104d3f4\/2023\/10\/24\/cfacd8e4-a7e8-4798-9184-b64d560909b9\/gettyimages-514629646-2.jpg?auto=webp&amp;width=1280\" alt=\"Messy paint tubes\"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/a\/img\/resize\/9c7a97e39eaad775bf44e2a290df6c231104d3f4\/2023\/10\/24\/cfacd8e4-a7e8-4798-9184-b64d560909b9\/gettyimages-514629646-2.jpg?auto=webp&amp;width=1280\" alt=\"Messy paint tubes\" width=\"1280\" height=\"851.3235986811117\" fetchpriority=\"low\"><\/picture><\/div>\n<p> <!----><\/div>\n<p> <!----><figcaption> <span class=\"c-shortcodeImage_credit g-outer-spacing-top-xsmall u-block\">ChamilleWhite\/Getty Images<\/span><\/figcaption><\/figure>\n<p>A major issue plaguing generative AI models is AI scraping, the process used by AI companies to train their <a href=\"https:\/\/www.zdnet.com\/article\/what-is-generative-ai-and-why-is-it-so-popular-heres-everything-you-need-to-know\/\" rel=\"follow\">AI models<\/a>&nbsp;by capturing data from internet sources without the owners&#8217; permission. AI scraping can have an especially negative impact on visual artists,&nbsp; whose work is scraped to generate new art in text-to-image models. Now, however, there may be a solution.&nbsp;<\/p>\n<p>Researchers at the University of Chicago have created Nightshade, a new tool that &nbsp;gives artists the ability to &#8220;poison&#8221; their digital art in order to prevent developers from training AI tools on their work.<\/p>\n<p><strong>Also:&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/more-fun-with-dall-e-3-in-chatgpt-can-it-design-a-t-shirt\/\" rel=\"follow\">More fun with DALL-E 3 in ChatGPT: Can it design a T-shirt?<\/a><\/strong><\/p>\n<p>Using Nightshade, artists can make changes to the pixels in their art that are invisible to the human eye, but cause the generative AI model to break in &#8220;chaotic&#8221; and &#8220;unpredictable&#8221; ways, according to the <a href=\"https:\/\/www.technologyreview.com\/2023\/10\/23\/1082189\/data-poisoning-artists-fight-generative-ai\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" class=\"c-regularLink\">MIT Technology Review<\/a>, which got an exclusive preview of the research.&nbsp;<\/p>\n<p><!----><\/p>\n<p>The prompt-specific attack causes generative AI models to render useless outputs due to manipulating the model&#8217;s learning, which causes the model to confuse subjects for each other.&nbsp;<\/p>\n<p>For example, it may learn that a dog is actually a cat, which would, in turn, cause the model to produce incorrect images that don&#8217;t match the text prompt.&nbsp;<\/p>\n<p>According to the research paper, Nightshade poison samples can corrupt a Stable Diffusion prompt in under 100 samples, as seen in the image below.&nbsp;<\/p>\n<figure class=\"c-shortcodeImage u-clearfix c-shortcodeImage-large\">\n<div class=\"c-shortcodeImage_imageContainer\">\n<div class=\"c-shortcodeImage_image\"><picture class=\"c-cmsImage\"><!----> <img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/article\/data-poisoning-tool-lets-artists-fight-back-against-ai-scraping-heres-how\/\" alt=\"University of Chicago research regarding AI\" width=\"1280\" height=\"696.0538979788258\" fetchpriority=\"low\"><\/picture><\/div>\n<p> <!----><\/div>\n<p> <!----><figcaption> <span class=\"c-shortcodeImage_credit g-outer-spacing-top-xsmall u-block\">University of Chicago<\/span><\/figcaption><\/figure>\n<p>In addition to poisoning the specific term, the poisoning also bleeds through associated terms.&nbsp;<\/p>\n<p>For example, in the example above, the term &#8220;dog&#8221; would not only be impacted but also synonyms like &#8220;puppy,&#8221; &#8220;hound,&#8221; and &#8220;husky,&#8221; according to the research paper.&nbsp;<\/p>\n<p>The correlation between the terms doesn&#8217;t have to be as direct as the example above either. For example, the paper delineates how when the term &#8220;fantasy art&#8221; was poisoned, so was the related phrase &#8220;a painting by Michael Whelan,&#8221; a well-known creator of fantasy art.&nbsp;<\/p>\n<p>There are different potential defenses that the model trainers could deploy, including filtering high-loss data, position detection methods, and poison removal methods, but all three aren&#8217;t entirely effective.&nbsp;<\/p>\n<p><strong>Also: <a href=\"https:\/\/www.zdnet.com\/article\/apple-will-soon-bring-ai-to-its-devices-according-to-reports-heres-where\/\" rel=\"follow\">Apple will soon bring AI to its devices, according to reports. Here&#8217;s where<\/a><\/strong><\/p>\n<p>Furthermore, the poisoned data is complicated to remove from the model since the AI company would have to go in and individually delete each corrupted sample.&nbsp;<\/p>\n<p>Nightshade not only has the potential to deter AI companies from using data without asking for permission but also encourages users to use precaution when employing any of these generative AI models.&nbsp;<\/p>\n<p>Other attempts have been made to mitigate the issue of artists&#8217; work being used without their permission. Some AI image-generating models, such as <a href=\"https:\/\/www.zdnet.com\/article\/getty-images-launches-its-own-commercialy-safe-ai-image-generator\/\" rel=\"follow\">Getty Images&#8217; image generator<\/a> and <a href=\"https:\/\/www.zdnet.com\/article\/adobe-firefly-now-out-of-beta-boasts-fix-for-dall-es-drawbacks\/\" rel=\"follow\">Adobe Firefly<\/a>, use only images that are approved by the artist or are open-sourced to train their models and have a compensation program in place in return.&nbsp;<\/p>\n<div id=\"pinbox-4cdbfbe5-c802-4437-a27a-1cf6fc9684cb\" class=\"c-shortcodePinbox-carousel\">\n<div class=\"c-listingCarouselHorizontal\">\n<h4 class=\"c-sectionHeading\">Artificial Intelligence<\/h4>\n<p> <!----> <span class=\"c-listingCarouselHorizontal_loadingIndicator\"><\/span> <\/div>\n<\/div>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/data-poisoning-tool-lets-artists-fight-back-against-ai-scraping-heres-how\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Called Nightshade, the tool messes with training data pixels to confuse image-generating AI models.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-54357","post","type-post","status-publish","format-standard","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Data poisoning tool lets artists fight back against AI scraping. Here&#039;s how 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/data-poisoning-tool-lets-artists-fight-back-against-ai-scraping-heres-how\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Data poisoning tool lets artists fight back against AI scraping. Here&#039;s how 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/data-poisoning-tool-lets-artists-fight-back-against-ai-scraping-heres-how\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-10-24T18:41:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.zdnet.com\/a\/img\/resize\/9c7a97e39eaad775bf44e2a290df6c231104d3f4\/2023\/10\/24\/cfacd8e4-a7e8-4798-9184-b64d560909b9\/gettyimages-514629646-2.jpg?auto=webp&amp;width=1280\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/data-poisoning-tool-lets-artists-fight-back-against-ai-scraping-heres-how\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/data-poisoning-tool-lets-artists-fight-back-against-ai-scraping-heres-how\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Data poisoning tool lets artists fight back against AI scraping. Here&#8217;s how\",\"datePublished\":\"2023-10-24T18:41:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/data-poisoning-tool-lets-artists-fight-back-against-ai-scraping-heres-how\\\/\"},\"wordCount\":517,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/data-poisoning-tool-lets-artists-fight-back-against-ai-scraping-heres-how\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/9c7a97e39eaad775bf44e2a290df6c231104d3f4\\\/2023\\\/10\\\/24\\\/cfacd8e4-a7e8-4798-9184-b64d560909b9\\\/gettyimages-514629646-2.jpg?auto=webp&amp;width=1280\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/data-poisoning-tool-lets-artists-fight-back-against-ai-scraping-heres-how\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/data-poisoning-tool-lets-artists-fight-back-against-ai-scraping-heres-how\\\/\",\"name\":\"Data poisoning tool lets artists fight back against AI scraping. Here's how 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/data-poisoning-tool-lets-artists-fight-back-against-ai-scraping-heres-how\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/data-poisoning-tool-lets-artists-fight-back-against-ai-scraping-heres-how\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/9c7a97e39eaad775bf44e2a290df6c231104d3f4\\\/2023\\\/10\\\/24\\\/cfacd8e4-a7e8-4798-9184-b64d560909b9\\\/gettyimages-514629646-2.jpg?auto=webp&amp;width=1280\",\"datePublished\":\"2023-10-24T18:41:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/data-poisoning-tool-lets-artists-fight-back-against-ai-scraping-heres-how\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/data-poisoning-tool-lets-artists-fight-back-against-ai-scraping-heres-how\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/data-poisoning-tool-lets-artists-fight-back-against-ai-scraping-heres-how\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/9c7a97e39eaad775bf44e2a290df6c231104d3f4\\\/2023\\\/10\\\/24\\\/cfacd8e4-a7e8-4798-9184-b64d560909b9\\\/gettyimages-514629646-2.jpg?auto=webp&amp;width=1280\",\"contentUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/9c7a97e39eaad775bf44e2a290df6c231104d3f4\\\/2023\\\/10\\\/24\\\/cfacd8e4-a7e8-4798-9184-b64d560909b9\\\/gettyimages-514629646-2.jpg?auto=webp&amp;width=1280\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/data-poisoning-tool-lets-artists-fight-back-against-ai-scraping-heres-how\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Data poisoning tool lets artists fight back against AI scraping. Here&#8217;s how\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Data poisoning tool lets artists fight back against AI scraping. Here's how 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/data-poisoning-tool-lets-artists-fight-back-against-ai-scraping-heres-how\/","og_locale":"en_US","og_type":"article","og_title":"Data poisoning tool lets artists fight back against AI scraping. Here's how 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/data-poisoning-tool-lets-artists-fight-back-against-ai-scraping-heres-how\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-10-24T18:41:00+00:00","og_image":[{"url":"https:\/\/www.zdnet.com\/a\/img\/resize\/9c7a97e39eaad775bf44e2a290df6c231104d3f4\/2023\/10\/24\/cfacd8e4-a7e8-4798-9184-b64d560909b9\/gettyimages-514629646-2.jpg?auto=webp&amp;width=1280","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/data-poisoning-tool-lets-artists-fight-back-against-ai-scraping-heres-how\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/data-poisoning-tool-lets-artists-fight-back-against-ai-scraping-heres-how\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Data poisoning tool lets artists fight back against AI scraping. Here&#8217;s how","datePublished":"2023-10-24T18:41:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/data-poisoning-tool-lets-artists-fight-back-against-ai-scraping-heres-how\/"},"wordCount":517,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/data-poisoning-tool-lets-artists-fight-back-against-ai-scraping-heres-how\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/9c7a97e39eaad775bf44e2a290df6c231104d3f4\/2023\/10\/24\/cfacd8e4-a7e8-4798-9184-b64d560909b9\/gettyimages-514629646-2.jpg?auto=webp&amp;width=1280","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/data-poisoning-tool-lets-artists-fight-back-against-ai-scraping-heres-how\/","url":"https:\/\/www.threatshub.org\/blog\/data-poisoning-tool-lets-artists-fight-back-against-ai-scraping-heres-how\/","name":"Data poisoning tool lets artists fight back against AI scraping. Here's how 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/data-poisoning-tool-lets-artists-fight-back-against-ai-scraping-heres-how\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/data-poisoning-tool-lets-artists-fight-back-against-ai-scraping-heres-how\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/9c7a97e39eaad775bf44e2a290df6c231104d3f4\/2023\/10\/24\/cfacd8e4-a7e8-4798-9184-b64d560909b9\/gettyimages-514629646-2.jpg?auto=webp&amp;width=1280","datePublished":"2023-10-24T18:41:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/data-poisoning-tool-lets-artists-fight-back-against-ai-scraping-heres-how\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/data-poisoning-tool-lets-artists-fight-back-against-ai-scraping-heres-how\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/data-poisoning-tool-lets-artists-fight-back-against-ai-scraping-heres-how\/#primaryimage","url":"https:\/\/www.zdnet.com\/a\/img\/resize\/9c7a97e39eaad775bf44e2a290df6c231104d3f4\/2023\/10\/24\/cfacd8e4-a7e8-4798-9184-b64d560909b9\/gettyimages-514629646-2.jpg?auto=webp&amp;width=1280","contentUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/9c7a97e39eaad775bf44e2a290df6c231104d3f4\/2023\/10\/24\/cfacd8e4-a7e8-4798-9184-b64d560909b9\/gettyimages-514629646-2.jpg?auto=webp&amp;width=1280"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/data-poisoning-tool-lets-artists-fight-back-against-ai-scraping-heres-how\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Data poisoning tool lets artists fight back against AI scraping. Here&#8217;s how"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/54357","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=54357"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/54357\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=54357"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=54357"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=54357"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}