One more stupid question—how is this different from a “man in the middle” attack? (Term from cryptography where you cannot trust your communications, because of a malicious agent between you and your recipient who’s changing your messages) The current recommended solution for those is encrypting your communication before you send it; I don’t know that there are any extant solutions for noticing you’ve got an MITM situation after the fact.
One more stupid question—how is this different from a “man in the middle” attack? (Term from cryptography where you cannot trust your communications, because of a malicious agent between you and your recipient who’s changing your messages)
The current recommended solution for those is encrypting your communication before you send it; I don’t know that there are any extant solutions for noticing you’ve got an MITM situation after the fact.
Man in the middle has 3 parties: Bob wants to talk to Alice, but we have Eve who wants to eavesdrop.
Here we have just 2 parties: Harry the human wants to talk to Alexa the AI, but is worried that Alexa is a liar.