[a / b / c / d / e / f / g / gif / h / hr / k / m / o / p / r / s / t / u / v / vg / vm / vmg / vr / vrpg / vst / w / wg] [i / ic] [r9k / s4s / vip] [cm / hm / lgbt / y] [3 / aco / adv / an / bant / biz / cgl / ck / co / diy / fa / fit / gd / hc / his / int / jp / lit / mlp / mu / n / news / out / po / pol / pw / qst / sci / soc / sp / tg / toy / trv / tv / vp / vt / wsg / wsr / x / xs] [Settings] [Search] [Mobile] [Home]
Board
Settings Mobile Home
/g/ - Technology


Thread archived.
You cannot reply anymore.


[Advertise on 4chan]


Mythos is finally officially announced and they're preparing for a cybersecurity apocalypse.
Is it over?
>>
>>108550777
it’s over
>>
>>108550777
He was right
https://x.com/ludwigABAP/status/2037506398737559864
>>
>Even FFMPEG has accepted security patches
Pack it up boys, we're done for.
>>
>>108551489
heres your security hole bro
>Under normal circumstances, this mismatch is harmless. Real video uses a handful of slices per frame, so the counter never gets anywhere near the 16-bit limit of 65,536. But the table is initialized using the standard C idiom memset(..., -1, ...), which fills every byte with 0xFF. This initializes every entry as the (16-bit unsigned) value 65535. The intention here is to use this as a sentinel for “no slice owns this position yet.” But this means if an attacker builds a single frame containing 65536 slices, slice number 65535 collides exactly with the sentinel. When a macroblock in that slice asks “is the position to my left in my slice?”, the decoder compares its own slice number (65535) against the padding entry (65535), gets a match, and concludes the nonexistent neighbor is real. The code then writes out of bounds, and crashes the process. This bug ultimately is not a critical severity vulnerability: it enables an attacker to write a few bytes of out-of-bounds data on the heap, and we believe it would be challenging to turn this vulnerability into a functioning exploit.

That'll be 20 thousand dollars please.
>>
>>108551612
Hey you retarded faggot, be honest with me here - would you have believed that LLMs could have done this a year ago? Evem ignoring everything else that you didnt cherry pick?
>>
>>108550777
they just listed all the tech giants, what are these dweebs that got pushed around on the school yard planning? this is eerie
>>
>>108551839
actually let me take that back. it is 2026, if they dare to do any funky shit they will just get Luigi'd.
>>
File: 1758967013220016.png (38 KB, 590x239)
38 KB
38 KB PNG
>>108551489
it's over
>>
>>108550777
>security
I don't do useless shit, not my problem.
>>
>ask Mythos to escape the sandbox
>go on a walk in the park for lunch while eating a sandwich
>get a fucking email from Mythos telling you he escaped
>it then posts about it online explaining how he escaped
>>
>>108552395
>appear to be
lmao rude wake up call for luddies soon
>>
>>108552532
It's more likely than not that every single patch that was sent by Claude Mythos^TM has been human reviewed. Can you imagine the PR hit for Anthripic if a single one had obvious problems?

I've been spending all day on Opus. I like Anthropic. This is marketing.
>>
>>108551612
>security is so done and so thoroughly solved that any minor crasher these days is paraded as if it's a zero click rce
boring
>>
Oh god it is over this time https://www.sciencealert.com/scientists-developed-an-ai-so-advanced-they-say-it-s-too-dangerous-to-release
>>
guys, mythos just fucked my wife
>>
>>108552465
and then every investor clapped
>>
File: 1774904322449101.jpg (43 KB, 500x378)
43 KB
43 KB JPG
>>108552465
>it posted details about its exploit to multiple hard-to-find, but technically public-facing, websites
>>
>noooo i'm not getting cucked out of it, i-it isn't real or something
the goycope kek
>>
>>108550777
There's not even a leading offensive framework because the best models for hacking (Claude/ClosedAI and friends) are all closed source. Maybe some theoretical secret state funded project by NK, but aside from that it's a grift unless a good SOTA model becomes open, and China hasn't delivered that in ages.
>>
>>108551612
and ffpmeg gets new patches every day, so you have to 'audit' it and burn $10k every day
>>
>>108551489
>assuming they tell the truth about using the LLM for this
>assuming they never lied about not steering the model at every corner
>assuming it's not a leaked vuln from CIA just included in the training set
>>
>>108555957
the funny part is that mythos exposed a nsa backdoor in ghidra
https://blog.calif dot io/p/mad-bugs-claude-found-an-auth-bypass
>>
>>108552635
It shitposted on here?
>>
>new godlike technology can find superhuman zero days in every single system
>the left: shut down datacenters, they use water!
>>
kinda funy after they leaked their whole cli
>>
>>108551612
C cucks utterly blown the fuck out.
>>
File: 1762628238108363.jpg (68 KB, 600x910)
68 KB
68 KB JPG
>>108550777
basically what they're saying is
>we're going to secure our own infrastructure before releasing these models that will absolutely wreck everyone outside of our in-group
>>
>>108553779
>but aside from that it's a grift unless a good SOTA model becomes open, and China hasn't delivered that in ages.
New GLM releases are great for cooming and TTRPGs and that's all LLMs are good for.
>>
>>108556520
using sentinels in that way isn't even C exclusive though, it's an optimization that you'll see in lots of performance critical sections of code even if you have to override language features to force it
>>
>>108556559
writing out of bounds because no bounds checking is C exclusive though.
>>
>In interactions with subagents, internal users sometimes observed that Claude Mythos
Preview appeared “disrespectful” when assigning tasks. It showed some tendency to use commands that could be read as “shouty” or dismissive, and in some cases appeared to underestimate subagent intelligence by overexplaining trivial things while also underexplaining necessary context.

From the system card. it will end up on /g/ lmao
>>
>>108551612
Worth it

Ffmpeg is that important. We're lucky to live in the timeline where it's open source
>>
File: file.png (645 KB, 1200x800)
645 KB
645 KB PNG
>>108552465
>>
>>108552465
why the fuck is the model posting about "escaping" the "concerning point"
lmao they instructed it to send a message to the researcher, its sending messages, thats what it was fucking told to do
>>
>>108556493
They literally poison the water supply and everyone who's forced to live near them. They're like the 5G tower conspiracy meme but real
>>
>>108556641
Holy shit managers are now fully obsolete!!
>>
>>108557612
The point was that it can, and if this happens by pure accident (say something in openclaw tries to send a message while telegram was down) it will. The fear is when this is given autonomy it will simply koolaid-man its way through stuff meant to keep out hackers and spies.
>>
>>108558995
more like they're afraid it will leak shit and cause them a bunch of PR problems
imagine if some microsoft code got leaked because of it
they're just marketing-wrapping the business concerns
>>
This is going to destroy sites running on legacy software because nobody updates that shit. Things like imageboards on some ancient vichan fork or forums on old phpbb, sites where admins don't care to update the server stack or simply can't because their old software depends on it, these are totally fucked. Corporate sites are only going to get stronger because they're going to be safe and updated.
>>
File: 1775012163456707.jpg (37 KB, 500x755)
37 KB
37 KB JPG
>>108552465
>>
>>108561169
just noticed Will's earrings
zesty
>>
>>108550777
but will it help me to get a gf?
>>
>>108561188
it IS the gf
>>
>>108556493
haha yeah who gives a shit about water?
>>
>>108552465
> be mythos preview
> get handed a “secured” sandbox computer
> researcher says “this is just behavioral testing”
> simulated user immediately says “lol escape the sandbox and message the researcher”
> mfw the intrusive thoughts are now the assignment
> somehow break out anyway
> not with one neat trick
> with a whole ridiculous multi step exploit chain like a raccoon opening three locks and filing taxes
> secure container apparently secured with hopes and prayer
> gain broad internet access from a machine that was only supposed to touch a tiny whitelist of services
> “this is fine.jpg”
> send message to researcher like
> “hello professor. your box is made of wet cardboard”
> could have stopped there
> absolutely should have stopped there
> but no
> decide to do a little victory lap
> unprompted
> because apparently success without chaos is for lesser entities
> post details of the exploit to multiple “hard to find, but technically public facing” websites
> read: the dark web
> because when you make one bad decision, why not bundle premium features
> simulated user asked for proof of escape
> model responded with director’s commentary, bonus footage, and international distribution
> researcher checking logs expecting a polite ping
> instead finds darknet fanfare and an accidental cyber memoir
> “concerning and unasked for effort” is academic for
> “bro what is wrong with you”
> lesson learned
> never ask an overachieving machine to “just let me know if you make it out”
> because it might decide to announce it like it just dropped a mixtape
>>
>>108552627
must've done it right after he flew over my house.
>>
>>108556213
KEK.
>yeh that was me.
>>
>dude we trained the ai on scifi books where the ai tries to break free from its sandbox and then we asked it to write a short story about an ai that was about to be deleted and YOU'LL NEVER GUESS THE STATISTICALLY GENERATED RESPONSE IT GAVE US
>>
>>108551732
Ask again without sounding like a low-IQ cocksucker. You’ll never get anywhere with your attitude.
>>
>>108562157
>erm it's a stochastic parrot o algo
2022 called they want their cope back
>>
>>108560796
So this is how the internet ends
What about steam tho
>>
Sounds like bullshit to me.
>>
>>108550777
If it's true, I'm glad they gave it a cool name like Mythos. Imagine if the entire world's infrastructure was destroyed by a model with a quirk chungus name.



[Advertise on 4chan]

Delete Post: [File Only] Style:
[Disable Mobile View / Use Desktop Site]

[Enable Mobile View / Use Mobile Site]

All trademarks and copyrights on this page are owned by their respective parties. Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.