Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. Can I bring your attention to one of the best security write-ups I’ve read in a long while.

Can I bring your attention to one of the best security write-ups I’ve read in a long while.

Scheduled Pinned Locked Moved Uncategorized
12 Posts 7 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • securitywriter@infosec.exchangeS securitywriter@infosec.exchange

    RE: https://infosec.exchange/@flyingpenguin/116399482954754093

    Can I bring your attention to one of the best security write-ups I’ve read in a long while.

    Bravo, Davi.

    @mttaggart flagged this one to me.

    catsalad@infosec.exchangeC This user is from outside of this forum
    catsalad@infosec.exchangeC This user is from outside of this forum
    catsalad@infosec.exchange
    wrote last edited by
    #2

    @SecurityWriter @mttaggart

    Whomp. Whomp. Sad trombone.

    simonzerafa@infosec.exchangeS 1 Reply Last reply
    0
    • securitywriter@infosec.exchangeS securitywriter@infosec.exchange

      RE: https://infosec.exchange/@flyingpenguin/116399482954754093

      Can I bring your attention to one of the best security write-ups I’ve read in a long while.

      Bravo, Davi.

      @mttaggart flagged this one to me.

      semitones@tiny.tilde.websiteS This user is from outside of this forum
      semitones@tiny.tilde.websiteS This user is from outside of this forum
      semitones@tiny.tilde.website
      wrote last edited by
      #3

      @SecurityWriter @mttaggart I am 3 paragraphs in and I have no idea what's going on... 😞 I guess I should have learned more about ai

      ftranschel@norden.socialF tezoatlipoca@mas.toT 2 Replies Last reply
      0
      • securitywriter@infosec.exchangeS securitywriter@infosec.exchange

        RE: https://infosec.exchange/@flyingpenguin/116399482954754093

        Can I bring your attention to one of the best security write-ups I’ve read in a long while.

        Bravo, Davi.

        @mttaggart flagged this one to me.

        semitones@tiny.tilde.websiteS This user is from outside of this forum
        semitones@tiny.tilde.websiteS This user is from outside of this forum
        semitones@tiny.tilde.website
        wrote last edited by
        #4

        @SecurityWriter @mttaggart

        > The verified facts in the document are real: XBOW topped HackerOne’s leaderboard, DARPA AIxCC found 54 vulnerabilities in four hours, Google Big Sleep found 20 zero-days in open source, Sysdig documented an AI attack reaching admin in eight minutes. Every one of those is independently confirmed by the organization that did the work, with named researchers, reproducible results, or public competition records. Every one of those also predates Mythos...

        I had no idea

        1 Reply Last reply
        0
        • securitywriter@infosec.exchangeS securitywriter@infosec.exchange

          RE: https://infosec.exchange/@flyingpenguin/116399482954754093

          Can I bring your attention to one of the best security write-ups I’ve read in a long while.

          Bravo, Davi.

          @mttaggart flagged this one to me.

          semitones@tiny.tilde.websiteS This user is from outside of this forum
          semitones@tiny.tilde.websiteS This user is from outside of this forum
          semitones@tiny.tilde.website
          wrote last edited by
          #5

          @SecurityWriter @mttaggart Can someone explain this part?

          > Anthropic has established, without discussion and without pushback, that a private company can unilaterally classify a capability as too dangerous for the public, grant selective access to the largest incumbents in the affected industry, and construct a parallel disclosure regime outside any democratic accountability structure. That precedent is exclusivity for abuse. [...]
          The model is not the story. A cartel is the story.

          tezoatlipoca@mas.toT 1 Reply Last reply
          0
          • R relay@relay.publicsquare.global shared this topic
          • semitones@tiny.tilde.websiteS semitones@tiny.tilde.website

            @SecurityWriter @mttaggart I am 3 paragraphs in and I have no idea what's going on... 😞 I guess I should have learned more about ai

            ftranschel@norden.socialF This user is from outside of this forum
            ftranschel@norden.socialF This user is from outside of this forum
            ftranschel@norden.social
            wrote last edited by
            #6

            @semitones @SecurityWriter @mttaggart Now, many CEOs are four years into their pivot, feel the same and couldn't care less.

            So kudos to you 🙂

            (Yes, it is a very specific thing to read. But believe me: It could have been *waaaay* more technical if it wasn't for the excellent writing 😅 )

            1 Reply Last reply
            0
            • semitones@tiny.tilde.websiteS semitones@tiny.tilde.website

              @SecurityWriter @mttaggart I am 3 paragraphs in and I have no idea what's going on... 😞 I guess I should have learned more about ai

              tezoatlipoca@mas.toT This user is from outside of this forum
              tezoatlipoca@mas.toT This user is from outside of this forum
              tezoatlipoca@mas.to
              wrote last edited by
              #7

              @semitones @SecurityWriter @mttaggart The terminology is a bit opaque if you don't live and breathe cubersecurity (I do not), not necessarily AI, but there's a pay off. Basically, Anthropic's claims about their new Claude Mythos AI model finding thousands of vulnerabilities in OS's and software is horseshit. Its no better than their previous Claude model. And their Project Glasswing is just a $VIP$ ticket to Emperor's New Clothesland.

              OP's article is as layperson it can be given the subject.

              1 Reply Last reply
              0
              • semitones@tiny.tilde.websiteS semitones@tiny.tilde.website

                @SecurityWriter @mttaggart Can someone explain this part?

                > Anthropic has established, without discussion and without pushback, that a private company can unilaterally classify a capability as too dangerous for the public, grant selective access to the largest incumbents in the affected industry, and construct a parallel disclosure regime outside any democratic accountability structure. That precedent is exclusivity for abuse. [...]
                The model is not the story. A cartel is the story.

                tezoatlipoca@mas.toT This user is from outside of this forum
                tezoatlipoca@mas.toT This user is from outside of this forum
                tezoatlipoca@mas.to
                wrote last edited by
                #8

                @semitones @SecurityWriter @mttaggart

                Anthropic's Glasswing is selling tickets to an exclusive club. Oh look, our Mythos model can find all these vulnerabilities in the softwares you use (it can't). You want secure software right? Well, better pay us $ for membership so you can stay on top of vulnerabilities WE discover.

                Generally some having access and others NOT having access leads to abuse.

                Problem is, as Ottenheimer lays out, Mythos doesn't actually do what Anthropic sales is claiming.

                semitones@tiny.tilde.websiteS 1 Reply Last reply
                0
                • tezoatlipoca@mas.toT tezoatlipoca@mas.to

                  @semitones @SecurityWriter @mttaggart

                  Anthropic's Glasswing is selling tickets to an exclusive club. Oh look, our Mythos model can find all these vulnerabilities in the softwares you use (it can't). You want secure software right? Well, better pay us $ for membership so you can stay on top of vulnerabilities WE discover.

                  Generally some having access and others NOT having access leads to abuse.

                  Problem is, as Ottenheimer lays out, Mythos doesn't actually do what Anthropic sales is claiming.

                  semitones@tiny.tilde.websiteS This user is from outside of this forum
                  semitones@tiny.tilde.websiteS This user is from outside of this forum
                  semitones@tiny.tilde.website
                  wrote last edited by
                  #9

                  @tezoatlipoca @SecurityWriter @mttaggart ah that makes Sense!! Did not realize they were selling memberships

                  tezoatlipoca@mas.toT 1 Reply Last reply
                  0
                  • semitones@tiny.tilde.websiteS semitones@tiny.tilde.website

                    @tezoatlipoca @SecurityWriter @mttaggart ah that makes Sense!! Did not realize they were selling memberships

                    tezoatlipoca@mas.toT This user is from outside of this forum
                    tezoatlipoca@mas.toT This user is from outside of this forum
                    tezoatlipoca@mas.to
                    wrote last edited by
                    #10

                    @semitones @SecurityWriter @mttaggart
                    Selling memberships wasn't the best characterization; but they're restricting use of their new model to "select" OS and infrastructure partners _first_, before general availability so these partners can fix things FIRST.

                    Of course I am not a cybersecurity export, NOR an AI expert, so perhaps I lack the technical qualifications to tell if Ottenheimer is full of shit, but from what I DO know of software it made sense.

                    1 Reply Last reply
                    0
                    • catsalad@infosec.exchangeC catsalad@infosec.exchange

                      @SecurityWriter @mttaggart

                      Whomp. Whomp. Sad trombone.

                      simonzerafa@infosec.exchangeS This user is from outside of this forum
                      simonzerafa@infosec.exchangeS This user is from outside of this forum
                      simonzerafa@infosec.exchange
                      wrote last edited by
                      #11

                      @catsalad @SecurityWriter @mttaggart

                      The Myth of Mythos 🤔🤷‍♂️

                      badsamurai@infosec.exchangeB 1 Reply Last reply
                      0
                      • simonzerafa@infosec.exchangeS simonzerafa@infosec.exchange

                        @catsalad @SecurityWriter @mttaggart

                        The Myth of Mythos 🤔🤷‍♂️

                        badsamurai@infosec.exchangeB This user is from outside of this forum
                        badsamurai@infosec.exchangeB This user is from outside of this forum
                        badsamurai@infosec.exchange
                        wrote last edited by
                        #12

                        @simonzerafa @catsalad @SecurityWriter @mttaggart

                        Davi for the take-down!

                        So sweet, so easy on the eyes, but hideous on the inside
                        Whole life spreading lies, but you can't hide, baby, nice try
                        I'm 'bout to switch up these vibes, I finally opened my eyes
                        It's time to kick you straight back into the night

                        https://youtu.be/l8Dr7vzMSVE

                        #kpdh

                        1 Reply Last reply
                        0
                        • R relay@relay.infosec.exchange shared this topic
                        Reply
                        • Reply as topic
                        Log in to reply
                        • Oldest to Newest
                        • Newest to Oldest
                        • Most Votes


                        • Login

                        • Login or register to search.
                        • First post
                          Last post
                        0
                        • Categories
                        • Recent
                        • Tags
                        • Popular
                        • World
                        • Users
                        • Groups