Tag: threat models
-
The Register: Arm reckons it’ll own 50% of the datacenter by year’s end
Source URL: https://www.theregister.com/2025/04/01/arm_datacenter_cpu_market/ Source: The Register Title: Arm reckons it’ll own 50% of the datacenter by year’s end Feedly Summary: Optimistic much? Arm expects to see its architecture account for half of the datacenter CPU market by the end of this year, up from 15 percent in 2024, all thanks to the AI boom.… AI…
-
Hacker News: The ESP32 "backdoor" that wasn’t
Source URL: https://darkmentor.com/blog/esp32_non-backdoor/ Source: Hacker News Title: The ESP32 "backdoor" that wasn’t Feedly Summary: Comments AI Summary and Description: Yes Summary: The text addresses the misconception that the ESP32 Bluetooth chips contain a backdoor, clarifying that the vendor-specific HCI commands discovered are common in Bluetooth technology and do not inherently indicate malicious intent. It discusses…
-
Simon Willison’s Weblog: Constitutional Classifiers: Defending against universal jailbreaks
Source URL: https://simonwillison.net/2025/Feb/3/constitutional-classifiers/ Source: Simon Willison’s Weblog Title: Constitutional Classifiers: Defending against universal jailbreaks Feedly Summary: Constitutional Classifiers: Defending against universal jailbreaks Interesting new research from Anthropic, resulting in the paper Constitutional Classifiers: Defending against Universal Jailbreaks across Thousands of Hours of Red Teaming. From the paper: In particular, we introduce Constitutional Classifiers, a framework…
-
The Register: Google to Iran: Yes, we see you using Gemini for phishing and scripting. We’re onto you
Source URL: https://www.theregister.com/2025/01/31/state_spies_google_gemini/ Source: The Register Title: Google to Iran: Yes, we see you using Gemini for phishing and scripting. We’re onto you Feedly Summary: And you, China, Russia, North Korea … Guardrails block malware generation Google says it’s spotted Chinese, Russian, Iranian, and North Korean government agents using its Gemini AI for nefarious purposes,…
-
Simon Willison’s Weblog: Lessons From Red Teaming 100 Generative AI Products
Source URL: https://simonwillison.net/2025/Jan/18/lessons-from-red-teaming/ Source: Simon Willison’s Weblog Title: Lessons From Red Teaming 100 Generative AI Products Feedly Summary: Lessons From Red Teaming 100 Generative AI Products New paper from Microsoft describing their top eight lessons learned red teaming (deliberately seeking security vulnerabilities in) 100 different generative AI models and products over the past few years.…
-
METR Blog – METR: Common Elements of Frontier AI Safety Policies
Source URL: https://metr.org/blog/2024-08-29-common-elements-of-frontier-ai-safety-policies/ Source: METR Blog – METR Title: Common Elements of Frontier AI Safety Policies Feedly Summary: AI Summary and Description: Yes Summary: The text discusses the Frontier AI Safety Commitments made by sixteen developers of large foundation models at the AI Seoul Summit, which focus on risk evaluation and mitigation strategies to ensure…