RSS

Com­puter Se­cu­rity & Cryptography

Tag

Se­cu­rity Mind­set and Or­di­nary Paranoia

Eliezer YudkowskyNov 25, 2017, 5:53 PM
132 points
25 comments29 min readLW link

On De­stroy­ing the World

Chris_LeongSep 28, 2020, 7:38 AM
82 points
86 comments5 min readLW link

Bet­ter Pass­word Peppering

Yoav RavidAug 24, 2021, 10:19 AM
6 points
9 comments3 min readLW link

Work on Se­cu­rity In­stead of Friendli­ness?

Wei DaiJul 21, 2012, 6:28 PM
71 points
107 comments2 min readLW link

POC || GTFO cul­ture as par­tial an­ti­dote to al­ign­ment wordcelism

lcMar 15, 2023, 10:21 AM
155 points
13 comments7 min readLW link2 reviews

Ac­cess to pow­er­ful AI might make com­puter se­cu­rity rad­i­cally easier

BuckJun 8, 2024, 6:00 AM
97 points
14 comments6 min readLW link

En­tropy isn’t suffi­cient to mea­sure pass­word strength

benwrJan 17, 2022, 6:41 AM
36 points
30 comments2 min readLW link
(www.benwr.net)

The dan­ger of er­ror descriptions

gistyaMar 25, 2021, 8:05 PM
−1 points
2 comments3 min readLW link

Ho­mo­mor­phic en­cryp­tion and Bitcoin

jimrandomhMay 19, 2011, 1:07 AM
10 points
9 comments1 min readLW link

What is Cryp­to­graph­i­cally Possible

paulfchristianoDec 24, 2010, 4:58 AM
27 points
19 comments5 min readLW link

Cryp­to­graphic Boxes for Un­friendly AI

paulfchristianoDec 18, 2010, 8:28 AM
76 points
162 comments5 min readLW link

Paper re­view: A Cryp­to­graphic Solu­tion to a Game The­o­retic Problem

victorsintnicolaasApr 24, 2021, 11:54 AM
23 points
4 comments6 min readLW link

Crypt­anal­y­sis as Episte­mol­ogy? (pag­ing cryp­ton­erds)

SilasBartaApr 6, 2011, 7:06 PM
17 points
42 comments1 min readLW link

[Question] How good is se­cu­rity for LessWrong and the Align­ment Fo­rum?

Quintin PopeOct 4, 2021, 10:27 PM
20 points
4 comments1 min readLW link

Se­cure homes for digi­tal people

paulfchristianoOct 10, 2021, 3:50 PM
161 points
37 comments9 min readLW link1 review
(sideways-view.com)

gamers be­ware: mod­ded Minecraft has new malware

the gears to ascensionJun 7, 2023, 1:49 PM
14 points
5 comments1 min readLW link
(github.com)

[Question] Is there a con­ve­nient way to make “sealed” pre­dic­tions?

Daniel KokotajloMay 6, 2022, 11:00 PM
32 points
20 comments1 min readLW link

The Un­bear­able Light­ness of Web Vulnerabilities

aiiixiiiMay 29, 2022, 9:13 PM
29 points
2 comments1 min readLW link
(www.theoreticalstructures.io)

[Question] How much does cy­ber­se­cu­rity re­duce AI risk?

DarmaniJun 12, 2022, 10:13 PM
34 points
23 comments1 min readLW link

Crypto-fed Computation

aaguirreJun 13, 2022, 9:20 PM
24 points
7 comments7 min readLW link

Se­cu­rity Mind­set: Les­sons from 20+ years of Soft­ware Se­cu­rity Failures Rele­vant to AGI Alignment

elspoodJun 21, 2022, 11:55 PM
362 points
42 comments7 min readLW link1 review

Im­pli­ca­tions of the AI Se­cu­rity Gap

Dan BraunJan 8, 2025, 8:31 AM
45 points
0 comments9 min readLW link

Up­skil­ling, bridge-build­ing, re­search on se­cu­rity/​cryp­tog­ra­phy and AI safety

Allison DuettmannApr 20, 2023, 10:32 PM
14 points
0 comments4 min readLW link

Uniker­nels: No Longer an Aca­demic Exercise

Martin SustrikOct 23, 2018, 11:40 AM
27 points
1 comment3 min readLW link
(250bpm.com)

[Question] What is good Cy­ber Se­cu­rity Ad­vice?

Gunnar_ZarnckeOct 24, 2022, 11:27 PM
30 points
12 comments2 min readLW link

11 dice­ware words is enough

Feb 15, 2024, 12:13 AM
23 points
6 comments1 min readLW link
(threadreaderapp.com)

Hacker-AI – Does it already ex­ist?

Erland WittkotterNov 7, 2022, 2:01 PM
3 points
12 comments11 min readLW link

5 Rea­sons Why Govern­ments/​Mili­taries Already Want AI for In­for­ma­tion Warfare

trevorOct 30, 2023, 4:30 PM
32 points
0 comments10 min readLW link

[Question] In soft­ware en­g­ineer­ing, what are the up­per limits of Lan­guage-Based Se­cu­rity?

mako yassDec 27, 2020, 5:50 AM
13 points
6 comments1 min readLW link

n of m ring signatures

DanielFilanDec 4, 2023, 8:00 PM
50 points
7 comments1 min readLW link
(danielfilan.com)

Not Get­ting Hacked

jefftkDec 21, 2022, 9:40 PM
40 points
14 comments7 min readLW link
(www.jefftk.com)

Pri­vacy Tradeoffs

jefftkDec 29, 2022, 3:40 AM
13 points
1 comment2 min readLW link
(www.jefftk.com)

How Likely is Los­ing a Google Ac­count?

jefftkJan 30, 2023, 12:20 AM
52 points
12 comments3 min readLW link
(www.jefftk.com)

AXRP Epi­sode 30 - AI Se­cu­rity with Jeffrey Ladish

DanielFilanMay 1, 2024, 2:50 AM
25 points
0 comments79 min readLW link

AI Gover­nance & Strat­egy: Pri­ori­ties, tal­ent gaps, & opportunities

Orpheus16Mar 3, 2023, 6:09 PM
56 points
2 comments4 min readLW link

[Question] Hoard­ing Gmail-ac­counts in a post-CAPTCHA world?

Alexander Gietelink OldenzielMar 11, 2023, 4:08 PM
7 points
3 comments1 min readLW link

AI se­cu­rity might be helpful for AI alignment

Igor IvanovJan 6, 2023, 8:16 PM
36 points
1 comment2 min readLW link

Reli­a­bil­ity, Se­cu­rity, and AI risk: Notes from in­fosec text­book chap­ter 1

Orpheus16Apr 7, 2023, 3:47 PM
34 points
1 comment4 min readLW link

Fron­tier Model Security

VaniverJul 26, 2023, 4:48 AM
32 points
1 comment3 min readLW link
(www.anthropic.com)

Prevent­ing model exfil­tra­tion with up­load limits

ryan_greenblattFeb 6, 2024, 4:29 PM
69 points
22 comments14 min readLW link

The rise of AI in cybercrime

BobyResearcherJul 30, 2023, 8:19 PM
−15 points
1 comment2 min readLW link
(riseofAIincybercryme)

Biose­cu­rity Cul­ture, Com­puter Se­cu­rity Culture

jefftkAug 30, 2023, 4:40 PM
103 points
11 comments2 min readLW link
(www.jefftk.com)

Free­dom and Pri­vacy of Thought Architectures

SebastianG Jul 20, 2024, 9:43 PM
5 points
2 comments1 min readLW link

AI Safety is Drop­ping the Ball on Clown Attacks

trevorOct 22, 2023, 8:09 PM
74 points
82 comments34 min readLW link

Re­vis­it­ing the Man­i­fold Hypothesis

Aidan RockeOct 1, 2023, 11:55 PM
13 points
19 comments4 min readLW link

Fix­ing In­sider Threats in the AI Sup­ply Chain

Madhav MalhotraOct 7, 2023, 1:19 PM
20 points
2 comments5 min readLW link

Lat­a­cora might be of in­ter­est to some AI Safety organizations

NunoSempereNov 25, 2021, 11:57 PM
14 points
10 comments1 min readLW link
(www.latacora.com)

[Question] Trans­fer­ring cre­dence with­out trans­fer­ring ev­i­dence?

KaarelFeb 4, 2022, 8:11 AM
11 points
6 comments3 min readLW link

Im­proved Se­cu­rity to Prevent Hacker-AI and Digi­tal Ghosts

Erland WittkotterOct 21, 2022, 10:11 AM
4 points
3 comments12 min readLW link

Hacker-AI and Digi­tal Ghosts – Pre-AGI

Erland WittkotterOct 19, 2022, 3:33 PM
9 points
7 comments8 min readLW link

Deep­fake(?) Phishing

jefftkOct 21, 2022, 2:30 PM
37 points
9 comments1 min readLW link
(www.jefftk.com)

Why do we post our AI safety plans on the In­ter­net?

Peter S. ParkNov 3, 2022, 4:02 PM
4 points
4 comments11 min readLW link

Safe Devel­op­ment of Hacker-AI Coun­ter­mea­sures – What if we are too late?

Erland WittkotterDec 1, 2022, 7:59 AM
3 points
0 comments14 min readLW link

Non-Tech­ni­cal Prepa­ra­tion for Hacker-AI and Cy­ber­war 2.0+

Erland WittkotterDec 19, 2022, 11:42 AM
2 points
0 comments25 min readLW link

Hacker-AI and Cy­ber­war 2.0+

Erland WittkotterDec 19, 2022, 11:46 AM
2 points
0 comments15 min readLW link

The 2/​3 rule for multi-fac­tor authentication

RomanHaukssonFeb 4, 2023, 2:57 AM
4 points
0 comments1 min readLW link
(roman.computer)

Neu­ral pro­gram syn­the­sis is a dan­ger­ous technology

syllogismJan 12, 2018, 4:19 PM
10 points
6 comments2 min readLW link

Nav­i­gat­ing the Attackspace

Jonas KgomoDec 12, 2023, 1:59 PM
1 point
0 comments2 min readLW link

Plan­ning to build a cryp­to­graphic box with perfect secrecy

Lysandre TerrisseDec 31, 2023, 9:31 AM
40 points
6 comments11 min readLW link

Agent mem­branes and causal distance

ChipmonkJan 2, 2024, 10:43 PM
20 points
3 comments3 min readLW link

Disprov­ing and par­tially fix­ing a fully ho­mo­mor­phic en­cryp­tion scheme with perfect secrecy

Lysandre TerrisseMay 26, 2024, 2:56 PM
16 points
1 comment18 min readLW link

Pro­tect­ing agent boundaries

ChipmonkJan 25, 2024, 4:13 AM
11 points
6 comments2 min readLW link

In­cor­po­rat­ing Mechanism De­sign Into De­ci­sion Theory

StrivingForLegibilityJan 26, 2024, 6:25 PM
17 points
4 comments4 min readLW link

How im­por­tant is AI hack­ing as LLMs ad­vance?

Artyom KarpovJan 29, 2024, 6:41 PM
1 point
0 comments6 min readLW link

PoMP and Cir­cum­stance: Introduction

benatkinDec 9, 2024, 5:54 AM
1 point
1 comment1 min readLW link

End-to-end hack­ing with lan­guage models

tchauvinApr 5, 2024, 3:06 PM
29 points
0 comments8 min readLW link

Can Large Lan­guage Models effec­tively iden­tify cy­ber­se­cu­rity risks?

emile delcourtAug 30, 2024, 8:20 PM
18 points
0 comments11 min readLW link

Cy­ber­se­cu­rity of Fron­tier AI Models: A Reg­u­la­tory Review

Apr 25, 2024, 2:51 PM
8 points
0 comments8 min readLW link

How to Fake Decryption

ohmurphySep 5, 2024, 9:18 AM
12 points
0 comments4 min readLW link
(ohmurphy.substack.com)

Can star­tups be im­pact­ful in AI safety?

Sep 13, 2024, 7:00 PM
15 points
0 comments6 min readLW link

Con­sider at­tend­ing the AI Se­cu­rity Fo­rum ’24, a 1-day pre-DEFCON event

Charlie Rogers-SmithJul 12, 2024, 11:01 PM
21 points
0 comments1 min readLW link

Se­cret Col­lu­sion: Will We Know When to Un­plug AI?

Sep 16, 2024, 4:07 PM
56 points
7 comments31 min readLW link

Us­ing an LLM per­plex­ity filter to de­tect weight exfiltration

Adam KarvonenJul 21, 2024, 6:18 PM
25 points
11 comments2 min readLW link

The Prag­matic Side of Cryp­to­graph­i­cally Box­ing AI

Bart JaworskiAug 6, 2024, 5:46 PM
6 points
0 comments9 min readLW link

Join the $10K Au­toHack 2024 Tournament

Paul BricmanSep 25, 2024, 11:54 AM
5 points
0 comments1 min readLW link
(noemaresearch.com)

GPT-4o Guardrails Gone: Data Poi­son­ing & Jailbreak-Tuning

Nov 1, 2024, 12:10 AM
18 points
0 comments6 min readLW link
(far.ai)

Hu­man study on AI spear phish­ing campaigns

Jan 3, 2025, 3:11 PM
79 points
8 comments5 min readLW link

Pre­dict­ing AI Re­leases Through Side Channels

Reworr RJan 7, 2025, 7:06 PM
16 points
1 comment1 min readLW link

Defense Against The Su­per-Worms

viemccoyMar 20, 2025, 7:24 AM
21 points
1 comment2 min readLW link

Hunt­ing for AI Hack­ers: LLM Agent Honeypot

Feb 12, 2025, 8:29 PM
34 points
0 comments5 min readLW link
(www.apartresearch.com)

AI in­fosec: first strikes, zero-day mar­kets, hard­ware sup­ply chains, adop­tion barriers

Allison DuettmannApr 1, 2023, 4:44 PM
41 points
0 comments9 min readLW link

Boundaries-based se­cu­rity and AI safety approaches

Allison DuettmannApr 12, 2023, 12:36 PM
43 points
2 comments6 min readLW link

The Virus—Short Story

Michael SoareverixApr 13, 2023, 6:18 PM
4 points
0 comments4 min readLW link

Cryp­to­graphic and aux­iliary ap­proaches rele­vant for AI safety

Allison DuettmannApr 18, 2023, 2:18 PM
7 points
0 comments6 min readLW link

Prevent­ing AI Mi­suse: State of the Art Re­search and its Flaws

Madhav MalhotraApr 23, 2023, 5:37 PM
15 points
0 comments11 min readLW link
(forum.effectivealtruism.org)

[Question] How much should e-sig­na­tures have to cost a coun­try?

FlorianHNov 21, 2023, 10:45 PM
5 points
5 comments1 min readLW link

[Question] AI in­ter­pretabil­ity could be harm­ful?

Roman LeventovMay 10, 2023, 8:43 PM
13 points
2 comments1 min readLW link

Us­ing GPT-Eliezer against ChatGPT Jailbreaking

Dec 6, 2022, 7:54 PM
170 points
85 comments9 min readLW link

Microsoft and Google us­ing LLMs for Cybersecurity

PhosphorousMay 18, 2023, 5:42 PM
6 points
0 comments5 min readLW link

Trans­former Ar­chi­tec­ture Choice for Re­sist­ing Prompt In­jec­tion and Jail-Break­ing Attacks

RogerDearnaleyMay 21, 2023, 8:29 AM
9 points
1 comment4 min readLW link

Scry­ing for out­comes where the prob­lem of deep­fakes has been solved

mako yassApr 15, 2019, 4:45 AM
26 points
10 comments4 min readLW link

Es­ti­mat­ing the con­se­quences of de­vice de­tec­tion tech

JsevillamolJul 8, 2018, 6:25 PM
27 points
4 comments7 min readLW link

On See­ing Through ‘On See­ing Through: A Unified The­ory’: A Unified Theory

gwernJun 15, 2019, 6:57 PM
26 points
0 comments1 min readLW link
(www.gwern.net)

Com­puter se­cu­rity story

PerplexedFeb 17, 2011, 12:26 AM
5 points
30 comments1 min readLW link

Se­cu­rity Mind­set and the Lo­gis­tic Suc­cess Curve

Eliezer YudkowskyNov 26, 2017, 3:58 PM
106 points
49 comments20 min readLW link

Op­ti­mal User-End In­ter­net Se­cu­rity (Or, Ra­tional In­ter­net Brows­ing)

Arkanj3lSep 9, 2011, 6:23 PM
2 points
23 comments1 min readLW link

Proof of pos­te­ri­or­ity: a defense against AI-gen­er­ated misinformation

jchanJul 17, 2023, 12:04 PM
33 points
3 comments5 min readLW link

Pri­vacy in a Digi­tal World

FaustifyJul 27, 2023, 10:46 AM
2 points
0 comments5 min readLW link

Ap­ply to the Con­cep­tual Boundaries Work­shop for AI Safety

ChipmonkNov 27, 2023, 9:04 PM
50 points
0 comments3 min readLW link
No comments.