Chapter 2 — Modern AI-Enabled Threat Model ........................ 34 • Threat Actors; Capability Surface; Extended Kill-Chain ............. 39–41
Chapter 3 — Trustworthy Data Principles .......................... 62
Chapter 6 — Data Poisoning & Timeline (TA01) ..................... 101
Chapter 7 — Adversarial ML & Prompt/Policy Injection (TA02) ..... 147
Chapter 8 — Governance/Policy Poisoning (TA03) .................. 185
Chapter 9 — Absorption Vectors: Data / Policy / Compute (TA04) .. 236
Chapter 10 — ECLIPSE & EXTERNAL ANCHORS ........................ 268
Chapter 11 — Deep Infrastructure Illusion (TA06): Intuition & Threat Model .............................................. 330
thevieart•2h ago
Chapter 2 — Modern AI-Enabled Threat Model ........................ 34 • Threat Actors; Capability Surface; Extended Kill-Chain ............. 39–41
Chapter 3 — Trustworthy Data Principles .......................... 62
Chapter 6 — Data Poisoning & Timeline (TA01) ..................... 101
Chapter 7 — Adversarial ML & Prompt/Policy Injection (TA02) ..... 147
Chapter 8 — Governance/Policy Poisoning (TA03) .................. 185
Chapter 9 — Absorption Vectors: Data / Policy / Compute (TA04) .. 236
Chapter 10 — ECLIPSE & EXTERNAL ANCHORS ........................ 268
Chapter 11 — Deep Infrastructure Illusion (TA06): Intuition & Threat Model .............................................. 330