Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Blog Pricing
Podcast Image

LessWrong (Curated & Popular)

"Do not be surprised if LessWrong gets hacked" by RobertM

09 Apr 2026

Transcription

Chapter 1: What is LessWrong's current security posture?

0.031 - 11.969 Unknown

Do not be surprised if LessWrong gets hacked. By Robert M. Published on April 8, 2026. Or, for that matter, anything else.

0

13.091 - 32.477 Robert M

This post is meant to be two things. 1. A PSA about LessWrong's current security posture from a LessWrong admin. 2. An attempt to establish common knowledge of the security situation it looks like the world, and, by extension, you will shortly be in. Claude Mythos was announced yesterday.

0

32.537 - 43.183 Robert M

That announcement came with a blog post from Anthropic's Frontier Red team, detailing the large number of zero days and other security vulnerabilities discovered by Mythos.

0

43.872 - 63.343 Robert M

This should not be a surprise if you were paying attention, LLMs, being trained on coding first was a big hint, the labs putting cybersecurity as a top-level item in their threat models and evals was another, and frankly this blog post maybe could have been written a couple months ago, either this or this might have been sufficient. But it seems quite overdetermined now.

0

64.645 - 82.269 Robert M

Heading Less wrong security posture In the past, I have tried to communicate that Lesrong should not be treated as a platform with a hardened security posture. Lesrong is run by a small team. Our operational philosophy is similar to that of many early-stage startups.

83.37 - 105.132 Robert M

We treat some less wrong data as private in a social sense, but do not consider ourselves to be in the business of securely storing sensitive information. We make many choices and trade-offs in the direction that marginally favor speed over security, which many large organizations would make differently. I think this is reasonable and roughly endorse the kinds of trade-offs we're making.

105.112 - 127.305 Robert M

I think it is important for you to understand the above when making decisions about how to use LessWrong. Please do not store highly sensitive information in LessWrong drafts or send it to other users via LessWrong messages with the expectation that LessWrong will be robust to the maybe upcoming wave of scaled cyber attacks. LessWrong is not a high-value target.

127.842 - 139.198 Robert M

While LessWrong may end up in the affected blast radius simply due to its nature as an online platform, we do not store the kind of user data that cybercriminals in the business of conducting scaled cyberattacks are after.

140.22 - 160.465 Robert M

The most likely outcome of a data breach is that the database is scanned via automated tooling for anything that looks like account credentials, crypto wallet keys, LLM inference provider API keys, or similar. If you have ever stored anything like that in a draft post or sent it to another user via LessWrongDM, I recommend cycling it immediately.

Chapter 2: How does the announcement of Claude Mythos impact cybersecurity?

199.87 - 211.63 Robert M

From what I could find, probably well under half of data breaches result in datasets that get publicly circulated in any meaningful sense. Many of those that do are for sale, not freely available.

0

212.42 - 231.323 Robert M

Someone with a chip on their shoulder might download a freely available dataset, but is much less likely to spend money on it and also risk the eye of the state if they then try to use that purchased data for anything untoward. Datasets like this often don't ever really go away, but they often do become unavailable, especially if they're large.

0

232.405 - 254.101 Robert M

Storage is expensive, hosting sites generally take them down on request, torrenting is risky, and there isn't much motive to keep re-uploading terabytes of data that you aren't even selling. Monetizable datasets tend to be stripped down and much smaller, but also wouldn't include approximately any of the information that you might be concerned about here. Subheading. FAQ.

0

255.162 - 276.852 Robert M

There are three details boxes here, which are omitted from this narration. The three boxes have the titles what private data of mine could be exposed in a breach, can I delete my data, and is less wrong planning on changing anything. Heading. The broader situation. Epistemic status. I am not a security professional.

0

277.439 - 290.959 Robert M

I am a software engineer who has spent more time thinking about security than the median software engineer, but maybe not the 99th percentile. This section necessarily requires some extrapolation into the uncertain future.

291.209 - 301.648 Robert M

A proper treatment of what's about to happen really deserves its own post, ideally by a subject matter expert, or at least someone who's spent quite a bit more time on thinking about this question than I have.

302.75 - 320.181 Robert M

I nonetheless include some very quick thoughts below, mostly relevant to US-based individuals that don't have access to highly sensitive corporate secrets or classified government information. Many existing threat models don't seem obviously affected by the first-order impacts of a dramatic increase in scalable cyber-offensive capabilities.

321.263 - 344.299 Robert M

For threat models which seem likely to get worse are third-party data breaches, software supply chain attacks, ransomware, and cryptocurrency theft. I'm not sure what to do about data breaches, in general. The typical vector of exploitation is often various forms of fraud involving identity theft or impersonation, but scaled blackmail campaigns wouldn't be terribly shocking as a new problem.

345.44 - 363.64 Robert M

One can also imagine many other problems cropping up downstream of LLMs providing scalable cognition, enabling many avenues of value extraction that were previously uneconomical due to the sheer volume of data. If you're worried about identity theft, set up a credit freeze. Behave virtuously.

Comments

There are no comments yet.

Please log in to write the first comment.