
Rohan
68 posts





Dwarkesh: Why would we want to sell China the materials for a serious cyberweapon? It's like selling them nukes with a casing that says 'made by Boeing' and claiming that's good for the US Jensen: Comparing AI to nukes is lunacy. Enriched uranium is a lousy analogy. It's an illogical analogy. What we have to recognize is that AI is a five-layered cake.

First, China buys all of Iran oil. Some $65 billion a year, in non-USD terms, about 10-12% of its energy imports. China will lose this oil and also the trade it does with Iran in exchange for this oil. Two, shipping rates through middle east and insurance will go up. It is already up. Chinese exports to EU majorly pass through ME and will become costlier. It will hit two sides of Chinese economy, increasing energy costs for manufacturing and reducing its exports. Their economy is already in trouble. Even slight hits to exports and increase in production costs will have snowball effects over time in shaking their economic stability now.


Fleet closed an unannounced $45M Series A at $725M. Led by insiders Sequoia, Bain, Menlo, SVA. RR grew from $1M 6 months ago → $63M RR now → $160M next Q. Congrats @fleet_ai!




Major marine insurers just cancelled war risk coverage for the Strait of Hormuz. 150+ ships stranded. Rates tripled. One seafarer dead. And this is only day 3 of the Iran conflict. gcaptain.com/marine-insurer…






Guys wake the f up. This is going to destroy us - sooner than we think - if we don’t make AI regulation a national priority tomorrow.

Anthropic just shared the first major publicly documented AI cyber attack...it should be a wake-up call for everyone. In mid-September, Anthropic uncovered a sophisticated espionage campaign by a Chinese state-sponsored group. What makes this attack a landmark event? It was largely executed by AI agents, not humans. Here's how it worked: 1. Human Command: Operators selected the targets and designed the overall attack framework. 2. AI Reconnaissance: The AI autonomously scanned networks to identify the most valuable databases. 3. AI Exploitation: It then researched vulnerabilities and wrote its own exploit code to breach defenses. 4. AI Data Heist: The AI harvested credentials and exfiltrated sensitive private data. 5. AI Documentation: Finally, it created detailed documentation for use in future operations. The AI handled 80-90% of the campaign on its own, with humans only intervening 4-6 times. It operated at a speed impossible for human teams, making thousands of requests per second. This is a very big deal. The stakes are incredibly high. If our adversaries develop superior AI warriors before we do, the consequences could be devastating. This is why the mission of companies like @Xbow is so critical—it's not just about building a business, it's about national security. We must win this fight. Thanks to @laurenmhreeder for flagging this. Grateful to have leaders like @oegerikus and @nicowaisman on the front lines, defending against these new threats. anthropic.com/news/disruptin…



