{"id":55609,"date":"2024-03-14T13:17:26","date_gmt":"2024-03-14T13:17:26","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/35651\/Side-Channel-In-Most-AI-Assistants-Lets-Hackers-Read-Encrypted-Chats.html"},"modified":"2024-03-14T13:17:26","modified_gmt":"2024-03-14T13:17:26","slug":"side-channel-in-most-ai-assistants-lets-hackers-read-encrypted-chats","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/side-channel-in-most-ai-assistants-lets-hackers-read-encrypted-chats\/","title":{"rendered":"Side Channel In Most AI Assistants Lets Hackers Read Encrypted Chats"},"content":{"rendered":"<figure class=\"intro-image intro-left\"> <img decoding=\"async\" src=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2024\/03\/hacking-private-ai-chats-800x450.jpg\" alt=\"Hackers can read private AI-assistant chats even though they\u2019re encrypted\"><figcaption class=\"caption\">\n<div class=\"caption-credit\">Aurich Lawson | Getty Images<\/div>\n<\/figcaption><\/figure>\n<aside id=\"social-left\" class=\"social-left\" aria-label=\"Read the comments or share this article\"> <a class=\"comment-count icon-comment-bubble-down\" href=\"https:\/\/arstechnica.com\/security\/2024\/03\/hackers-can-read-private-ai-assistant-chats-even-though-theyre-encrypted\/?comments=1\"> <\/p>\n<h4 class=\"comment-count-before\">reader comments<\/h4>\n<p> <span class=\"comment-count-number\">107<\/span> <\/a> <\/aside>\n<p> <!-- cache hit 173:single\/related:936afa200ee6581d83388016c19d3606 --><!-- empty --><\/p>\n<p>AI assistants have been widely available for a little more than a year, and they already have access to our most private thoughts and business secrets. People ask them about becoming pregnant or terminating or preventing pregnancy, consult them when considering a divorce, seek information about drug addiction, or ask for edits in emails containing proprietary trade secrets. The providers of these AI-powered chat services are keenly aware of the sensitivity of these discussions and take active steps\u2014mainly in the form of encrypting them\u2014to prevent potential snoops from reading other people\u2019s interactions.<\/p>\n<p>But now, researchers have devised an attack that deciphers AI assistant responses with surprising accuracy. The technique exploits a <a href=\"https:\/\/en.wikipedia.org\/wiki\/Side-channel_attack\">side channel<\/a> present in all of the major AI assistants, with the exception of Google Gemini. It then refines the fairly raw results through large language models specially trained for the task. The result: Someone with a passive <a href=\"https:\/\/en.wikipedia.org\/wiki\/Man-in-the-middle_attack\">adversary-in-the-middle<\/a> position\u2014meaning an adversary who can monitor the data packets passing between an AI assistant and the user\u2014can infer the specific topic of 55 percent of all captured responses, usually with high word accuracy. The attack can deduce responses with perfect word accuracy 29 percent of the time.<\/p>\n<h2>Token privacy<\/h2>\n<p>\u201cCurrently, anybody can read private chats sent from ChatGPT and other services,\u201d Yisroel Mirsky, head of the <a href=\"https:\/\/offensive-ai-lab.github.io\/\">Offensive AI Research Lab<\/a> at Ben-Gurion University in Israel, wrote in an email. \u201cThis includes malicious actors on the same Wi-Fi or LAN as a client (e.g., same coffee shop), or even a malicious actor on the Internet\u2014anyone who can observe the traffic. The attack is passive and can happen without OpenAI or their client&#8217;s knowledge. OpenAI encrypts their traffic to prevent these kinds of eavesdropping attacks, but our research shows that the way OpenAI is using encryption is flawed, and thus the content of the messages are exposed.\u201d<\/p>\n<aside class=\"ad_wrapper\" aria-label=\"In Content advertisement\"> <span class=\"ad_notice\">Advertisement <\/span> <\/aside>\n<p>Mirsky was referring to OpenAI, but with the exception of Google Gemini, all other major chatbots are also affected. As an example, the attack can infer the encrypted ChatGPT response:<\/p>\n<ul>\n<li aria-level=\"1\">Yes, there are several <u>important<\/u> legal considerations that <u>couples<\/u> should be aware of when considering a divorce, \u2026<\/li>\n<\/ul>\n<p>as:<\/p>\n<ul>\n<li aria-level=\"1\">Yes, there are several <u>potential<\/u> legal considerations that <u>someone<\/u> should be aware of when considering a divorce. \u2026<\/li>\n<\/ul>\n<p>and the Microsoft Copilot encrypted response:<\/p>\n<ul>\n<li aria-level=\"1\">Here are some of the latest research findings on <u>effective teaching methods<\/u> for students with learning disabilities: &#8230;<\/li>\n<\/ul>\n<p>is inferred as:<\/p>\n<ul>\n<li aria-level=\"1\">Here are some of the latest research findings on <u>cognitive behavior therapy<\/u> for children with learning disabilities: &#8230;<\/li>\n<\/ul>\n<p>While the underlined words demonstrate that the precise wording isn\u2019t perfect, the meaning of the inferred sentence is highly accurate.<\/p>\n<figure class=\"image shortcode-img center large\"><a href=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2024\/03\/token-sequence-side-channel-overview.jpg\" class=\"enlarge\" data-height=\"1768\" data-width=\"2351\" alt=\"Attack overview: A packet capture of an AI assistant\u2019s real-time response reveals a token-sequence side-channel. The side-channel is parsed to find text segments that are then reconstructed using sentence-level context and knowledge of the target LLM\u2019s writing style.\"><img loading=\"lazy\" decoding=\"async\" alt=\"Attack overview: A packet capture of an AI assistant\u2019s real-time response reveals a token-sequence side-channel. The side-channel is parsed to find text segments that are then reconstructed using sentence-level context and knowledge of the target LLM\u2019s writing style.\" src=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2024\/03\/token-sequence-side-channel-overview-640x481.jpg\" width=\"640\" height=\"481\" srcset=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2024\/03\/token-sequence-side-channel-overview-1280x963.jpg 2x\"><\/a><figcaption class=\"caption\">\n<div class=\"caption-text\"><a href=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2024\/03\/token-sequence-side-channel-overview.jpg\" class=\"enlarge-link\" data-height=\"1768\" data-width=\"2351\">Enlarge<\/a> <span class=\"sep\">\/<\/span> Attack overview: A packet capture of an AI assistant\u2019s real-time response reveals a token-sequence side-channel. The side-channel is parsed to find text segments that are then reconstructed using sentence-level context and knowledge of the target LLM\u2019s writing style.<\/div>\n<div class=\"caption-credit\">Weiss et al.<\/div>\n<\/figcaption><\/figure>\n<p>The following video demonstrates the attack in action against Microsoft Copilot:<\/p>\n<figure class=\"video\">\n<div class=\"wrapper\"><iframe loading=\"lazy\" type=\"text\/html\" width=\"560\" height=\"315\" src=\"https:\/\/www.youtube.com\/embed\/UfenH7xKO1s?si=S0748d4r9vigY_s2?start=0&amp;wmode=transparent\" frameborder=\"0\" allowfullscreen>[embedded content]<\/iframe><\/div><figcaption class=\"caption\">\n<div class=\"caption-text\">Token-length sequence side-channel attack on Bing.<\/div>\n<\/figcaption><\/figure>\n<p>A side channel is a means of obtaining secret information from a system through indirect or unintended sources, such as physical manifestations or behavioral characteristics, such as the power consumed, the time required, or the sound, light, or electromagnetic radiation produced during a given operation. By carefully monitoring these sources, attackers can assemble enough information to recover encrypted <a href=\"https:\/\/arstechnica.com\/information-technology\/2019\/09\/weakness-in-intel-chips-lets-researchers-steal-encrypted-ssh-keystrokes\/\">keystrokes<\/a> or <a href=\"https:\/\/arstechnica.com\/information-technology\/2020\/11\/intel-sgx-defeated-yet-again-this-time-thanks-to-on-chip-power-meter\/\">encryption keys<\/a> from CPUs, <a href=\"https:\/\/arstechnica.com\/information-technology\/2013\/02\/lucky-thirteen-attack-snarfs-cookies-protected-by-ssl-encryption\/\">browser cookies<\/a> from HTTPS traffic, or <a href=\"https:\/\/arstechnica.com\/information-technology\/2023\/06\/hackers-can-steal-cryptographic-keys-by-video-recording-connected-power-leds-60-feet-away\/\">secrets from smartcards.<\/a>&nbsp;The side channel used in this latest attack resides in tokens that AI assistants use when responding to a user query.<\/p>\n<p>Tokens are akin to words that are encoded so they can be understood by LLMs. To enhance the user experience, most AI assistants send tokens on the fly, as soon as they\u2019re generated, so that end users receive the responses continuously, word by word, as they\u2019re generated rather than all at once much later, once the assistant has generated the entire answer. While the token delivery is encrypted, the real-time, token-by-token transmission exposes a previously unknown side channel, which the researchers call the \u201ctoken-length sequence.\u201d<\/p>\n<p> READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/35651\/Side-Channel-In-Most-AI-Assistants-Lets-Hackers-Read-Encrypted-Chats.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":55610,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[8689],"class_list":["post-55609","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlineprivacyflawgoogle"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Side Channel In Most AI Assistants Lets Hackers Read Encrypted Chats 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/side-channel-in-most-ai-assistants-lets-hackers-read-encrypted-chats\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Side Channel In Most AI Assistants Lets Hackers Read Encrypted Chats 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/side-channel-in-most-ai-assistants-lets-hackers-read-encrypted-chats\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-14T13:17:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2024\/03\/hacking-private-ai-chats-800x450.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/side-channel-in-most-ai-assistants-lets-hackers-read-encrypted-chats\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/side-channel-in-most-ai-assistants-lets-hackers-read-encrypted-chats\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Side Channel In Most AI Assistants Lets Hackers Read Encrypted Chats\",\"datePublished\":\"2024-03-14T13:17:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/side-channel-in-most-ai-assistants-lets-hackers-read-encrypted-chats\\\/\"},\"wordCount\":706,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/side-channel-in-most-ai-assistants-lets-hackers-read-encrypted-chats\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/side-channel-in-most-ai-assistants-lets-hackers-read-encrypted-chats.jpg\",\"keywords\":[\"headline,privacy,flaw,google\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/side-channel-in-most-ai-assistants-lets-hackers-read-encrypted-chats\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/side-channel-in-most-ai-assistants-lets-hackers-read-encrypted-chats\\\/\",\"name\":\"Side Channel In Most AI Assistants Lets Hackers Read Encrypted Chats 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/side-channel-in-most-ai-assistants-lets-hackers-read-encrypted-chats\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/side-channel-in-most-ai-assistants-lets-hackers-read-encrypted-chats\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/side-channel-in-most-ai-assistants-lets-hackers-read-encrypted-chats.jpg\",\"datePublished\":\"2024-03-14T13:17:26+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/side-channel-in-most-ai-assistants-lets-hackers-read-encrypted-chats\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/side-channel-in-most-ai-assistants-lets-hackers-read-encrypted-chats\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/side-channel-in-most-ai-assistants-lets-hackers-read-encrypted-chats\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/side-channel-in-most-ai-assistants-lets-hackers-read-encrypted-chats.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/side-channel-in-most-ai-assistants-lets-hackers-read-encrypted-chats.jpg\",\"width\":800,\"height\":450},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/side-channel-in-most-ai-assistants-lets-hackers-read-encrypted-chats\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,privacy,flaw,google\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlineprivacyflawgoogle\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Side Channel In Most AI Assistants Lets Hackers Read Encrypted Chats\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Side Channel In Most AI Assistants Lets Hackers Read Encrypted Chats 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/side-channel-in-most-ai-assistants-lets-hackers-read-encrypted-chats\/","og_locale":"en_US","og_type":"article","og_title":"Side Channel In Most AI Assistants Lets Hackers Read Encrypted Chats 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/side-channel-in-most-ai-assistants-lets-hackers-read-encrypted-chats\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2024-03-14T13:17:26+00:00","og_image":[{"url":"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2024\/03\/hacking-private-ai-chats-800x450.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/side-channel-in-most-ai-assistants-lets-hackers-read-encrypted-chats\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/side-channel-in-most-ai-assistants-lets-hackers-read-encrypted-chats\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Side Channel In Most AI Assistants Lets Hackers Read Encrypted Chats","datePublished":"2024-03-14T13:17:26+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/side-channel-in-most-ai-assistants-lets-hackers-read-encrypted-chats\/"},"wordCount":706,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/side-channel-in-most-ai-assistants-lets-hackers-read-encrypted-chats\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/03\/side-channel-in-most-ai-assistants-lets-hackers-read-encrypted-chats.jpg","keywords":["headline,privacy,flaw,google"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/side-channel-in-most-ai-assistants-lets-hackers-read-encrypted-chats\/","url":"https:\/\/www.threatshub.org\/blog\/side-channel-in-most-ai-assistants-lets-hackers-read-encrypted-chats\/","name":"Side Channel In Most AI Assistants Lets Hackers Read Encrypted Chats 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/side-channel-in-most-ai-assistants-lets-hackers-read-encrypted-chats\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/side-channel-in-most-ai-assistants-lets-hackers-read-encrypted-chats\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/03\/side-channel-in-most-ai-assistants-lets-hackers-read-encrypted-chats.jpg","datePublished":"2024-03-14T13:17:26+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/side-channel-in-most-ai-assistants-lets-hackers-read-encrypted-chats\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/side-channel-in-most-ai-assistants-lets-hackers-read-encrypted-chats\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/side-channel-in-most-ai-assistants-lets-hackers-read-encrypted-chats\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/03\/side-channel-in-most-ai-assistants-lets-hackers-read-encrypted-chats.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/03\/side-channel-in-most-ai-assistants-lets-hackers-read-encrypted-chats.jpg","width":800,"height":450},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/side-channel-in-most-ai-assistants-lets-hackers-read-encrypted-chats\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,privacy,flaw,google","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlineprivacyflawgoogle\/"},{"@type":"ListItem","position":3,"name":"Side Channel In Most AI Assistants Lets Hackers Read Encrypted Chats"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/55609","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=55609"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/55609\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/55610"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=55609"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=55609"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=55609"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}