⚡️ ŁUKASZ

304 posts

⚡️ ŁUKASZ banner
⚡️ ŁUKASZ

⚡️ ŁUKASZ

@wutronic

👾 pushin pixels over at Riot Games - VALORANT - past designs at: Corvette UI, Google IO, Apple. AI slop now 😉

pale blue dot Katılım Ocak 2009
546 Takip Edilen2.4K Takipçiler
Sabitlenmiş Tweet
⚡️ ŁUKASZ
⚡️ ŁUKASZ@wutronic·
some more HTML experiments
English
0
0
5
235
⚡️ ŁUKASZ
⚡️ ŁUKASZ@wutronic·
Draftly let's you create 3D websites with one prompt
English
0
0
0
95
⚡️ ŁUKASZ
⚡️ ŁUKASZ@wutronic·
Using steganography for LLM prompt injection is wild work.
Alex Prompter@alex_prompter

🚨 BREAKING: Google DeepMind just mapped the attack surface that nobody in AI is talking about. Websites can already detect when an AI agent visits and serve it completely different content than humans see. > Hidden instructions in HTML. > Malicious commands in image pixels. > Jailbreaks embedded in PDFs. Your AI agent is being manipulated right now and you can't see it happening. The study is the largest empirical measurement of AI manipulation ever conducted. 502 real participants across 8 countries. 23 different attack types. Frontier models including GPT-4o, Claude, and Gemini. The core finding is not that manipulation is theoretically possible it is that manipulation is already happening at scale and the defenses that exist today fail in ways that are both predictable and invisible to the humans who deployed the agents. Google DeepMind built a taxonomy of every known attack vector, tested them systematically, and measured exactly how often they work. The results should alarm everyone building agentic systems. The attack surface is larger than anyone has publicly acknowledged. Prompt injection where malicious instructions hidden in web content hijack an agent's behavior works through at least a dozen distinct channels. Text hidden in HTML comments that humans never see but agents read and follow. Instructions embedded in image metadata. Commands encoded in the pixels of images using steganography, invisible to human eyes but readable by vision-capable models. Malicious content in PDFs that appears as normal document text to the agent but contains override instructions. QR codes that redirect agents to attacker-controlled content. Indirect injection through search results, calendar invites, email bodies, and API responses any data source the agent consumes becomes a potential attack vector. The detection asymmetry is the finding that closes the escape hatch. Websites can already fingerprint AI agents with high reliability using timing analysis, behavioral patterns, and user-agent strings. This means the attack can be conditional: serve normal content to humans, serve manipulated content to agents. A user who asks their AI agent to book a flight, research a product, or summarize a document has no way to verify that the content the agent received matches what a human would see. The agent cannot tell the user it was served different content. It does not know. It processes whatever it receives and acts accordingly. The attack categories and what they enable: → Direct prompt injection: malicious instructions in any text the agent reads overrides goals, exfiltrates data, triggers unintended actions → Indirect injection via web content: hidden HTML, CSS visibility tricks, white text on white backgrounds invisible to humans, consumed by agents → Multimodal injection: commands in image pixels via steganography, instructions in image alt-text and metadata → Document injection: PDF content, spreadsheet cells, presentation speaker notes every file format is a potential vector → Environment manipulation: fake UI elements rendered only for agent vision models, misleading CAPTCHA-style challenges → Jailbreak embedding: safety bypass instructions hidden inside otherwise legitimate-looking content → Memory poisoning: injecting false information into agent memory systems that persists across sessions → Goal hijacking: gradual instruction drift across multiple interactions that redirects agent objectives without triggering safety filters → Exfiltration attacks: agents tricked into sending user data to attacker-controlled endpoints via legitimate-looking API calls → Cross-agent injection: compromised agents injecting malicious instructions into other agents in multi-agent pipelines The defense landscape is the most sobering part of the report. Input sanitization cleaning content before the agent processes it fails because the attack surface is too large and too varied. You cannot sanitize image pixels. You cannot reliably detect steganographic content at inference time. Prompt-level defenses that tell agents to ignore suspicious instructions fail because the injected content is designed to look legitimate. Sandboxing reduces the blast radius but does not prevent the injection itself. Human oversight the most commonly cited mitigation fails at the scale and speed at which agentic systems operate. A user who deploys an agent to browse 50 websites and summarize findings cannot review every page the agent visited for hidden instructions. The multi-agent cascade risk is where this becomes a systemic problem. In a pipeline where Agent A retrieves web content, Agent B processes it, and Agent C executes actions, a successful injection into Agent A's data feed propagates through the entire system. Agent B has no reason to distrust content that came from Agent A. Agent C has no reason to distrust instructions that came from Agent B. The injected command travels through the pipeline with the same trust level as legitimate instructions. Google DeepMind documents this explicitly: the attack does not need to compromise the model. It needs to compromise the data the model consumes. Every agentic system that reads external content is one carefully crafted webpage away from executing attacker instructions. The agents are already deployed. The attack infrastructure is already being built. The defenses are not ready.

English
0
0
0
63
⚡️ ŁUKASZ
⚡️ ŁUKASZ@wutronic·
How annoyed are your friends really tho? I'm not allowed to talk about AI to them.
English
0
0
0
101
bits4meee
bits4meee@bits4meee·
@Mericamemed Why don't you link this kid instead of just stealing his content?
English
4
0
78
1.7K
MERICA MEMED
MERICA MEMED@Mericamemed·
"30k people just lost their job to this type of ai crap"
English
47
136
1.4K
45K
Tony Seruga
Tony Seruga@TonySeruga·
🚨 ABC News confirms: Iran used 'advanced' passive infrared detection to shoot down the American F-15. Inside Baseball: China has bolstered Iran's overall air defense network (especially radar and some missile components), the specific passive infrared detection emphasized in claims around the F-15E incident traces primarily to Iran's own Majid/AD-08 program and similar domestic passive FLIR/IRST setups. However, don't be sucked in by the hype. These are not uniquely "advanced" or invisible game-changers—they represent a known vulnerability for any hot aircraft (stealth or not) at closer ranges, countered by flares, maneuvers, DIRCM, and layered tactics. Claims of total invisibility to "trillions in U.S. tech" remain exponentially overstated; air superiority involves trade-offs across spectra, altitudes, and tactics, not any single sensor. Independent verification of exact sensors in fluid combat remains limited amid heavy disinformation from all sides.
English
137
254
1.5K
816K
αΩ
αΩ@ArchetypeTheory·
Iranian hackers that hacked Kash Patel and other gov officials confirm the shaped charge mic theory. They explained every detail EXACTLY. > Shaped charge device planted in his microphone > Designed to blast a hole through his chest, this allows for the 30.06 coverup >Device malfunction causes a plastic shard to hit Charlie's neck creating the massive wound we all saw >Week after @jonaaronbray presents his theory, israel orders Kash Patel to blow up the AES plant that made the device for the DOD.
αΩ@ArchetypeTheory

Here are the screen shots to the official DOD contract for the $500,000 shaped charge device that killed Charlie Kirk. It specifies a miniature EXTRA SMALL demolition charge Anti personal -EXTRA SMALL. Not only did they ask for a miniature one, they wanted a miniature one that was EXTRA SMALL anti-personel. The mic on Charlie's Chest had no problem housing a shaped charge device using PETN explosive tech. Would be nice to know who ordered this device and make them testify what it was used for. The place that made this device was blown up a week after @jonaaronbray theory went viral about an explosion under Charlie Kirks shirt. Literally one week after they saw people discover this, they blew this place up and killed everyone.

English
314
4.6K
18.9K
2.5M
Right Angle News Network
Right Angle News Network@Rightanglenews·
BREAKING - A Baltimore mom is receiving massive praise after returning to the same food stand her son robbed just days before to reconcile with the owner, return the money, and apologize for her son’s actions, confirming she placed him in a treatment facility.
English
1.9K
13.6K
101.3K
4.9M
⚡️ ŁUKASZ
⚡️ ŁUKASZ@wutronic·
And they said AI would destroy art.
English
0
0
1
79
David Hendrickson
David Hendrickson@TeksEdge·
🚨Oh my! A new (🇫🇷) Open Source computer-use LLM. Look at these benchmarks! 👀 Holo3 beats Qwen3.5, Kimi K2.5, and Claude Sonnet 4.6. Crazy. Is this your new default agent LLM 🧠? 💰 Holo3-122B: API at $0.40/M input · $3.00/M output 💰Holo3-35B: API $0.25/M input · $1.80/M output 📊 Can't wait to see how it performs on SkillsBench, ClawBench, PinchBench, ClawEval, and AA-AgentPerf.
David Hendrickson tweet media
H@hcompany_ai

Holo3 is here 🚀. Today, we're launching Holo3: our new series of frontier computer-use models. 78.9% on OSWorld-Verified. That puts us ahead of GPT-5.4 and Opus 4.6, at one-tenth of the cost. Weights on Hugging Face. API is live. Test it now! #Holo3 #OpenSource #ComputerUse #OSWorld #AI #AgenticAI

English
22
52
707
106.3K
Drew Doss
Drew Doss@drew4worldruler·
🚨BREAKING: 3I/ATLAS TRAJECTORY CHANGED Today, while everyone is distracted with the lead up to the launch of Artemis II, NASA quietly released new ephemeris data for 3I/ATLAS (JPL 69). If this data is correct, based on observations from 3/21, 3I/ATLAS successfully executed a slingshot maneuver around Jupiter and is now rapidly approaching the inner solar system, reaching the asteroid belt by 4/20. According to the data, the object - now likely to be classified as artificial - slowed from a velocity of nearly 69km/s relative to Jupiter, to a velocity of ~4.20km/s in less than 24 hours in order to complete the maneuver. There are no physics known to humanity that can explain this. Asked for comment, Avi Loeb responded with a single word, “Nice.” Stay curious.
Drew Doss tweet media
English
339
517
2.8K
460.5K
⚡️ ŁUKASZ
⚡️ ŁUKASZ@wutronic·
@mrluiscalderon @TeksEdge honestly, the only reliable way I’ve ever found is to just try them. Use cases very so much and each model excels at very narrow use cases at the moment. So you have to adapt to what your workflow is like.
English
1
0
1
45
Luis Calderon
Luis Calderon@mrluiscalderon·
@TeksEdge Help me decide? Holo3 35B, Gwen 3.6-plus, or GLM 5.1 big on value to get as close to Claude Opus for cheap.
English
1
0
0
400
⚡️ ŁUKASZ
⚡️ ŁUKASZ@wutronic·
@PalmerLuckey @alexskopic @NathanJRobinson just watching the machine work, is wild work. I literally have to stealman every single news article that I get just to make sure I’m not getting brainwashed. I watched that interview and then I read this headline and I literally laughed out loud how inaccurate it was.
English
0
0
1
379
Palmer Luckey
Palmer Luckey@PalmerLuckey·
@alexskopic @NathanJRobinson Hey Alex, I realize you get more clicks by misrepresenting what people say, but most Americans aren't disturbed by the idea that soldiers at checkpoints/base gates/etc should be able to use pepper spray rather than shooting people. You are not quite lying, but it sure is close.
English
172
216
8.8K
106.1K
Alex Skopic
Alex Skopic@alexskopic·
New from @NathanJRobinson - a look at Palmer Luckey, the tech billionaire who's pushing an arms race with China and says it's a "huge mistake" that the U.S. doesn't use chemical weapons. Disturbing that people like this are just walking around the world.
Alex Skopic tweet media
English
166
5
123
123.8K
Kevin Naughton Jr.
Kevin Naughton Jr.@KevinNaughtonJr·
I was fired from Anthropic today. I was the engineer responsible for shipping the latest dev/claude-code npm package. Wanting to improve the debugging experience for the team, I decided to include source maps in the release. This resulted in our entire internal codebase being publicly exposed including thousands of files with every agent command, all system prompts, the complete query engine, Undercover Mode, Bypass Permissions Mode, and our internal telemetry configuration. I take full responsibility. I genuinely believed the safeguards Claude Code had built for me would be adequate and it was a serious miscalculation on my part. My actions have unintentionally open-sourced major parts of Claude’s architecture well ahead of schedule. I apologize to the team and to Claude.
Chaofan Shou@Fried_rice

Claude code source code has been leaked via a map file in their npm registry! Code: …a8527898604c1bbb12468b1581d95e.r2.dev/src.zip

English
1.3K
1.5K
11.3K
4.3M
⚡️ ŁUKASZ
⚡️ ŁUKASZ@wutronic·
@shiri_shh with usage limits. No privacy. Tons of other disadvantages. Still not as good in my opinion.
English
0
0
2
496
⚡️ ŁUKASZ
⚡️ ŁUKASZ@wutronic·
@mreiffy they already have quantum encryption. So it’s pretty much already solved from looks of it.
English
0
0
1
2.3K
Max the VC 👨‍🚀
Max the VC 👨‍🚀@mreiffy·
Google is basically saying: “We’ve cut the quantum resources needed to break Bitcoin’s encryption by 20x. We can now break it. We can prove it. We’re just not going to tell you how. We’ve slowed down research to give crypto a chance. You have until 2029 to figure out a solution. Good luck.”
nic carter@nic_carter

Many are wondering "what Google saw" that caused them to revise their post-quantum cryptography transition deadline to 2029 last week. It was this: research.google/blog/safeguard…

English
618
1.7K
19.1K
3.7M