- cross-posted to:
- ai_@lemmy.world
- lobsters@lemmy.bestiver.se
- cross-posted to:
- ai_@lemmy.world
- lobsters@lemmy.bestiver.se
Comments
I look forward to paying Claude to defend against the attackers using Claude /s
the crime against humanity that was C/C++ is being washed away by Rust
worry not
Exciting headline
AI mentioned

If they didn’t work with mythos those 271 zero days would be impacting everyone for the indefinite future…
making notes
Ryanna… is… a… Mark.
Got it.
Most of them were either:
- firefox vulnerabilities that only apply with sandbox specifically disabled
- not actually discovered by mythos and instead involved a researcher guiding mythos to the vulnerabilities, not the other way around
- not actually discovered by mythos and instead the model used was opus, which undermines the MyThOs Is ToO dAnGeRoUs narrative
Nearly all of the reporting on this subject is pure misinformation that contradicts the papers that were released.
This is just a stunt to create an excuse for why Anthropic cannot give public access to their latest model without revealing the truth and actual reason: their business model is not viable and it would bankrupt them.
‘fixes’ problem it created
yay!
It didn’t create the problem. These are existing high severity exploits
Everyone has the assumption that they were high severity, but neither Mozilla nor Anthropic even claimed so
that nobody knew of and most with no way to exploit…
Nobody knew of publicly, that’s the whole point of a zero day
These things get found and sold and used in secret for months or years before the public find and patch
you act like every exploit gives you a terminal
and do you really believe that the blue team for these companies does not have a presence on these forums trading these exploits there’s a reason most the big shit is either social eng or an insider threat




