
The Valley needs more water - period. Really proud to be bringing this funding home. californiaagtoday.com/water-wins-tha…
Berkeleyan @ 🦋
9.2K posts

@bswp
Neighbourhood organizer. Bicyclist and backpacker. Sierra Club volunteer. Software developer for biotech labs. More Roundabouts!

The Valley needs more water - period. Really proud to be bringing this funding home. californiaagtoday.com/water-wins-tha…

It’s time to demystify Mythos. Mythos is not magic. It’s not a doomsday device. It’s the first of many models that can automate cyber tasks (just like coding). OpenAI’s GPT-5.5-cyber can now do the same. And all the frontier models (including those from China) will be there within approximately 6 months. It’s important to recognize that these models do not create vulnerabilities; they discover them. The bugs are already in the code. Using AI to discover and patch them will actually harden these systems. The leap from pre-AI cyber to post-AI cyber means that there will be a big upgrade cycle. After that, however, the market is likely to reach a new equilibrium between AI-powered cyber-offense and AI-powered cyber-defense. Obviously it’s important that cyber defenders get access before cyber attackers. That process is already underway but needs to happen quickly (see point above about Chinese models). Unlike Mythos, GPT-5.5-cyber appears not to be token constrained so it may be the first cyber model that defenders actually get to use.


Fact Sheet: President Donald J. Trump is Accelerating Medical Treatments for Serious Mental Illness whitehouse.gov/fact-sheets/20…











