I’m a little skeptical of claims that securing access to a system is simple. I (not a superintelligence) can imagine the LLM generating code for tasks like these:
making or stealing some money
paying for a 0-day
using the 0-day to access the system
This doesn’t need to be done at the same time—e.g. I could set up an email on which to receive the 0-day and then write the code to use it.. This is very hard (it takes time) but doesn’t seem impossible for a human to do and we’re supposedly trying to secure something smarter.
I’m a little skeptical of claims that securing access to a system is simple. I (not a superintelligence) can imagine the LLM generating code for tasks like these:
making or stealing some money
paying for a 0-day
using the 0-day to access the system
This doesn’t need to be done at the same time—e.g. I could set up an email on which to receive the 0-day and then write the code to use it.. This is very hard (it takes time) but doesn’t seem impossible for a human to do and we’re supposedly trying to secure something smarter.