Lily Jamali
đ€ SpeakerAppearances Over Time
Podcast Appearances
Se oli iloinen, mutta myös silloin, kun Celestin vanhemmat menivÀt kohdalle, hÀnen vanhempansa kÀrsivÀnÀ kÀrsivÀnÀ, ja hÀnen vanhempansa kÀrsivÀnÀ kÀrsivÀnÀ, oli tÀysin silmÀÀ. Sitten kuulimme aiemmin Los Angelesin puolustusjohtajan Nathan Hockmanista.
TÀmÀ tietenkin alkoi, kun lapset olivat löytÀneet ja ylöspÀÀttyneet. He olivat löydÀneet 2.5.2020 Davids Teslaissa, kun joku osoitti, ettÀ hÀnellÀ tuli pysyvÀÀ pysyvyyttÀ Hollywoodin alueella.
Artists lawyers have said that the actual evidence in the case will show that he did not murder Celeste and that he was not the cause of her death. But for months we understand that a grand jury has been hearing evidence. Now it all comes out in the opening in public court hearings. We know from the authorities that this teenager was last seen alive in April 2025, when she had gone to Burke's house in the Hollywood Hills. And since then she was never seen or heard from again.
KyllÀ, tÀmÀ on itse asiassa kutsuttu Claude Mithos-previewin. Ja sinÀ olet tÀysin oikeassa. Se, mitÀ he sanoivat, oli, ettÀ tÀmÀ AI-modelli on heidÀn kaikkein vahvoin modellinsa tilanteessa. Ja se on niin vaikeaa, ettÀ he eivÀt voi jÀttÀÀ meitÀ kÀyttÀmÀÀn sitÀ.
So what they're doing is they are confining its use to just a couple of dozen big companies, many of them major tech companies. So NVIDIA will have a chance to use it to find bugs in its code. Amazon Web Services, another one is CrowdStrike, which you might remember back in 2024.
sent out sort of a standard update that ended up leading to a massive global IT outage. Other companies that will use it include Microsoft and Google, which are actually competitors to Anthropics, so there's some interesting coordination happening.
And this project that they're launching with all these companies is called Project Glasswing, named after the glasswing butterfly, which has transparent wings. And the idea is that the glasswing butterfly, because of its...
glass wings is able to protect itself in plain sight. It's able to hide in plain sight like many cyber security bugs. So that's part of why it was designated this way. And they also say, you know, the transparency that they are espousing here, anthropic is espousing here, will help keep all of us safe just the way that those transparent wings help keep the glass wing butterflies safe.
Joten kÀytÀnnössÀ he laittavat Claude Mythosin valmistautumiseen yritysten valmistautumiseen, mutta se on kÀytettÀvÀ erityisesti cybersuojelun alueella, onko se oikein? Se on juuri oikein, jotta he voivat kÀydÀ koodissaan ja löytÀÀ rikkoja hyvin nopeasti, rikkoja, jotka voivat tarvita todella pitkÀn aikaa ihmisen löytÀmiseen.
It is in many ways an AI model like some of the ones that you have probably worked with yourself. And I will caveat my answer by saying that everything that we know about Mythos is coming from the company, is coming from Anthropic. So we haven't gotten to play with it ourselves. And so I think anytime we hear an announcement from an AI developer, that...
Kysymys tulee mieleen. Kuinka paljon tÀstÀ on hyppiÀ? Koska tÀssÀ on niin paljon rahaa laittamassa tÀhÀn alueeseen. Ja niin, you know, grain of salt a little bit, but mythos, the way that Anthropic tells it, was good at everything. But they noticed that it was especially good at hacking. And so...
MitÀ tÀmÀ AI-tulki voi tehdÀ, se on sivittÀÀ suurta mÀÀrÀÀ sopimusta ja löytÀÀ rikkoja. Oli yksi tutkijan, joka sanoi, ettÀ viime viikkoja kÀyttÀmÀllÀ tÀmÀn toolin, hÀn oli voinut löytÀÀ enemmÀn rikkoja kuin hÀnen koko karjansa yhdessÀ.
What's also interesting is that this mythos tool can actually craft what are known in cybersecurity circles as exploits. The tool can come up with hacks, and it can do this without any human intervention. And what Anthropic says is that they found some very old bugs that had gone undiscovered for decades. So there was one that is a 27-year-old bug that's just been sort of sitting there hiding in plain sight.
It was on a very secure operating system that's used for critical infrastructure. So think of things like financial systems or power grids or healthcare systems. Absolutely critical services for all of us. They also found a vulnerability in the Linux kernel. The Linux kernel runs basically most of the world's servers. And Mythos was able to connect multiple vulnerabilities there in a way that would enable...
Any old person who knows what they're doing to take control of a machine remotely. You can just imagine how much fun a hacker could have with that. Well, could you give us some examples of how a bad actor might use mythos?
You could take a country that has an extensive cyber hacking program, a country like Iran or North Korea or China or Russia. These are countries that we know often engage in state-sponsored attacks. You could use this software, if you had access to it, to go into the code of a local power utility â
Ja löytÀÀ vaikutuksia. Ja tÀmÀ kautta...
YlipÀÀtÀÀn, jos kukaan henkilökohtainen toiminta on mahdollista löytÀÀ yhteyksiÀ, jotka tarvitsevat todella pitkÀn aikaa henkilölle löytÀÀ, niin he voivat kÀsitellÀ hakemuksen. He voisivat kÀytÀnnössÀ vÀhimmÀisen tapauksen tapauksessa tuoda vallan. Joten on paljon tavoitteita, joilla kansainvÀliset cyberhakemukset voisivat tuoda vallan kriittiseen infrastruktuuriaan, kuten vallan, terveydenhuolto- ja pankkipalveluista.
KyllÀ. Se ei tarvitse paljon henkilökohtaisuutta. Kun puhutaan ihmisistÀ AI-yhteisöistÀ, ajattelen, ettÀ kun nÀmÀ jÀrjestelmÀt kehittyvÀt paremmin, on hieman huolta, ettÀ ihmiset eivÀt tiedÀ, mitÀ tapahtuu. Se tuntuu enemmÀn ja enemmÀn kuin valkoisella kohdalla, kun nÀmÀ teknologiat kehittyvÀt.
In AI circles there is this principle that you just mentioned, known as alignment. The idea is that if you're designing an AI system, you want to try and design your models and systems in a way that follows certain rules that you lay out for it. The hope being that these models don't