Like cyber criminals with AI, people have been using invisible commands for years on apps we all use. Here is how it works.