All services not running behind AWS, GCP or Azure will be banned from access to the newly branded “Internet 2.0”, as they are proven vulnerable to attack from any newer “PhD+ level reasoning/coding ai agent”.
See also:
“Critical infrastructure systems often suffer from “patch lag,” resulting in software remaining unpatched for extended periods, sometimes years or decades. In many cases, patches cannot be applied in a timely manner because systems must operate without interruption, the software remains outdated because its developer went out of business, or interoperability constraints require specific legacy software.”—Superintelligence Strategy by Dan Hendrycks, Eric Schmidt, Alexandr Wang Mar 2025 https://www.nationalsecurity.ai/chapter/ai-is-pivotal-for-nationaZ<l-security, https://arxiv.org/abs/2503.05628
“Partner with critical national infrastructure companies (e.g. power utilities) to patch vulnerabilities”—“An Approach to Technical AGI Safety and Security” Google DeepMind Team, Apr 2025 https://arxiv.org/html/2504.01849v1#S5
“How I used o3 to find CVE-2025-37899, a remote zeroday vulnerability in the Linux kernel’s SMB implementation”—https://sean.heelan.io/2025/05/22/how-i-used-o3-to-find-cve-2025-37899-a-remote-zeroday-vulnerability-in-the-linux-kernels-smb-implementation/