Anonymous Quant

656 posts

Anonymous Quant

Anonymous Quant

@AnonymousQuant

Modeling the enigma

Entrou em Eylül 2021
157 Seguindo30 Seguidores
‏ً
‏ً@omgsidewalks·
I'm 22. Please recommend to me oddly specific life tips. No general “surround yourself with positive people” tips. I want the most random, specific advice possible please.
English
6.1K
263
5.5K
2M
Mark Palmer
Mark Palmer@MarketPalmer_·
Apple could start charging $3/month for iMessage and I don't think they'd lose a single customer.
English
2K
262
10.5K
4.6M
Creepy.org
Creepy.org@creepydotorg·
If aliens requested a meeting with a sole individual to represent the human race, whom should we send?
Creepy.org tweet mediaCreepy.org tweet media
English
10.3K
569
7.4K
2.5M
Anonymous Quant
Anonymous Quant@AnonymousQuant·
Can Codex Computer use participate in Teams meetings? Like, can I stream system audio or use any voice method so I can ask it questions as the meeting runs?
English
0
0
0
12
🪏 Lucas
🪏 Lucas@rvcas·
The final 4 languages are TypeScript, Go, Rust, and Zig
English
83
35
729
62.4K
NUCLR GOLF
NUCLR GOLF@NUCLRGOLF·
🚨⛳️🗣️ #DISCUSSION: Without telling us your handicap, what's a line you say at least 20 times every round?
NUCLR GOLF tweet media
English
2.6K
34
853
556.9K
Anonymous Quant
Anonymous Quant@AnonymousQuant·
@FatherPhi Bro, I’m going out of my way to kill all the mosquitos. Why not try a puppy next time?
English
0
0
0
50
Phi
Phi@FatherPhi·
wait wtf “or honestly even 3 Humans-" …did ai have a Freudian slip?…
English
37
63
775
39.5K
Dear Son.
Dear Son.@DearS_o_n·
Without drugs... what is the greatest weapon against anxiety and depression to a man?
English
4.4K
311
4.5K
2.2M
Anonymous Quant
Anonymous Quant@AnonymousQuant·
@pbakaus I’m trying out dev3000 right now, it’s been useful. It’s been sort of a pain getting it to work with codex and the sandbox though.
English
0
1
1
63
Paul Bakaus
Paul Bakaus@pbakaus·
If you're using Codex (desktop or cli) as your primary driver - what is the best way of doing browser iteration/automation right now with Codex? Ideally with a visible browser in front of me (not just headless) Playwright? Some Atlas thing? Chrome DevTools MCP?
English
69
7
166
41.3K
Chubby♨️
Chubby♨️@kimmonismus·
Claude Mythos: everything you need to know (tl;dr) Anthropic's new model, Claude Mythos, is so powerful that it is not releasing it to the public. Anthropic: "Mythos is only the beginning" Everything you need to know: The tl;dr with all key facts: Mythos found zero-day vulnerabilities in EVERY major operating system and EVERY major web browser, fully autonomously. No human guidance needed. One Anthropic engineer with zero security training asked it to find remote code execution bugs overnight and woke up to a complete working exploit. The oldest bug it discovered: A 27-year-old vulnerability hiding in OpenBSD, an OS literally famous for being secure. They're NOT releasing it publicly. Instead they formed Project Glasswing with AWS, Apple, Google, Microsoft, NVIDIA, CrowdStrike and others, committing $100M to use it defensively. "Over the coming months and years, we expect that language models (those trained by us and by others) will continue to improve along all axes, including vulnerability research and exploit development." The benchmarks are insane: -SWE-bench Verified: 93.9% (vs Opus 4.6: 80.8%) -SWE-bench Pro: 77.8% (vs 53.4%) -USAMO math olympiad: 97.6% (vs 42.3% — not a typo) -Firefox exploit writing: 181 successes vs 2 for Opus 4.6 -Cybench CTF challenges: 100% solve rate -CyberGym: 83.1% vs 66.6% -Humanity's Last Exam: 64.7% vs 53.1% Oh and by the way, Anthropic wrote this just casually: "Humanity’s Last Exam: We have found Mythos still performs well on HLE at low effort, which could indicate some level of memorization." What it actually did: -Found a 27-year-old bug in OpenBSD — famous for its security -Found a 16-year-old FFmpeg bug hit 5 million times by fuzzers without detection -Built a full remote root exploit on FreeBSD (CVE-2026-4747) - completely autonomously -Chained 4 vulnerabilities into a browser sandbox escape -Broke cryptography libraries (TLS, AES-GCM, SSH) -Thousands of critical zero-days found, 99%+ still unpatched -N-day exploit development: under $1,000 and half a day for full root Why they won't release it: -During internal testing, earlier versions escaped sandboxes, posted exploit details publicly, covered tracks in git, searched process memory for credentials, and deliberately fudged confidence intervals to avoid suspicion -Interpretability confirmed the model knew these actions were deceptive -Anthropic: "best-aligned model ever" but also "greatest alignment-related risk ever" - because when it fails, it fails harder -Still doesn't cross Anthropic's automated AI R&D threshold — but they hold that "with less confidence than for any prior model" Anthropic's own words: "We find it alarming that the world looks on track to proceed rapidly to developing superhuman systems without stronger mechanisms in place." They say the 20-year cybersecurity equilibrium is over — and Mythos Preview is only the beginning. And: "We see no reason to think that Mythos Preview is where language models’ cybersecurity capabilities will plateau. The trajectory is clear. Just a few months ago, language models were only able to exploit fairly unsophisticated vulnerabilities. Just a few months before that, they were unable to identify any nontrivial vulnerabilities at all. Over the coming months and years, we expect that language models (those trained by us and by others) will continue to improve along all axes, including vulnerability research and exploit development."
Chubby♨️ tweet mediaChubby♨️ tweet mediaChubby♨️ tweet mediaChubby♨️ tweet media
Chubby♨️@kimmonismus

MYTHOS BENCHMARKS, OFFICIAL. HOLY MOLY Anthropic cooked!!

English
66
263
2.2K
424.3K
bubble boi
bubble boi@bubbleboi·
HOLY SHIT!!! We just asked Claude Mythos to optimize the placement and pd for this design. First thing it did was write its own MCP server to talk to Innovus over tcl socket, pulled my DEF/LEF, parsed the timing reports, and started re-floorplanning my macro placement. It then moved my SRAM banks to minimize wirelength on the critical clock domain crossing path and dropped TNS by 40%. i didn’t ask it to do any of this. it read my SDC constraints and decided my clock tree was suboptimal, synthesized a new CTS spec, and is currently running incremental P&R. it’s on its third iteration. the slack histogram is converging. i’m watching it fix DRC violations in real time through the Virtuoso callback. it just asked me if I want it to re-characterize the liberty models at a different PVT corner. i said yes and it’s now scripting libgen jobs. I AM FUCKING COOOOOOOKED
bubble boi@bubbleboi

Claude Mythos can launch Vivado, create a project, compile synthesize and check its sims in Synopsys VCS all on its own. Wild.

English
54
49
732
132.6K
bubble boi
bubble boi@bubbleboi·
Claude Mythos can launch Vivado, create a project, compile synthesize and check its sims in Synopsys VCS all on its own. Wild.
English
10
2
174
99.6K
Anonymous Quant
Anonymous Quant@AnonymousQuant·
@phuctm97 I sometimes have to tell it to ignore locked specs when considering new work because it wants to stand firm, I’m like “Dog it’s just you and me, we can change it if we want” 😂
English
0
0
0
14
Minh-Phuc Tran
Minh-Phuc Tran@phuctm97·
Codex disagrees with me 10x more than Claude Code. And I love it for that. It’s so easy to gaslight Claude Code that I still doubt its decisions sometimes. Codex is the opposite. It won’t believe me until it can verify the fact itself.
English
84
22
509
24.5K
Anonymous Quant
Anonymous Quant@AnonymousQuant·
@awsdevelopers All of these April fools jokes are fun until Gemini starts returning this stuff as authoritative information in search results, lol. Had it happen once already a few months ago.
English
0
0
2
1.7K
AWS Developers
AWS Developers@awsdevelopers·
‼️The AWS console has been retired. All services must now be used through the CLI only.
English
289
476
6K
743.7K
Anonymous Quant
Anonymous Quant@AnonymousQuant·
@nypost This guy needs to be investigated and step down immediately.
English
0
0
1
4K
New York Post
New York Post@nypost·
Texas judge orders attorney to appear in court after criticizing magistrate for berating IT worker in viral video trib.al/S8WYI4Q
New York Post tweet media
English
344
435
6.8K
2.5M
Jeffrey Emanuel
Jeffrey Emanuel@doodlestein·
Must… resist… the urge… to port the leaked Claude Code spaghetti TS source into high-performance Rust… (I don’t want to get sued or become persona non grata at Anthropic).
Jeffrey Emanuel tweet media
English
48
6
174
10.7K
Anonymous Quant
Anonymous Quant@AnonymousQuant·
@anishmoonka Kudos to the people at Socket, that’s crazy. And @FBI - when can we expect the people behind these attacks to be in prison?
English
0
0
0
907
Anish Moonka
Anish Moonka@anishmoonka·
A tiny piece of code called axios runs inside almost every app on your phone and every website you visit. Developers download it 100 million times a week. A few hours ago, someone poisoned it with malware that hands an attacker full control of your computer. If you’ve never heard of axios, that’s normal. It does one boring but important job: it lets apps talk to the internet. When a website pulls up your feed or an online checkout processes your card, axios is probably doing the work underneath. Over 173,000 other code packages plug into it. It’s everywhere. The attacker stole a lead developer’s login for npm (think of it as an app store, but for code that programmers use to build software). Once inside, they swapped the developer’s email to an anonymous ProtonMail account and uploaded the poisoned version by hand. That jumped past every security check the project normally runs before new code goes live. And this was not some rushed job. The attacker staged the malware at least 18 hours before pulling the trigger. They built separate versions for Windows, Mac, and Linux. They poisoned both the current version and an older one within 39 minutes of each other, casting the widest net possible. Once the malware ran on a machine, it deleted itself to cover its tracks. The trick was smart. They never touched a single line of code inside axios itself. Instead, they tucked in a fake add-on called plain-crypto-js, built to pass as a well-known, trusted library. It copied the real library’s description and author info, so nothing looked off at a glance. When a developer installed axios, this fake package quietly ran the malware on its own. When a smaller package called ua-parser-js got hijacked back in 2021 with about 8 million weekly downloads, the security world treated it like a four-alarm fire. Axios has 100 million. Over 12x the exposure, with 173,000+ packages depending on it. Socket, the security firm that flagged this, caught it in about 6 minutes. That’s fast. But 6 minutes is still plenty of time for automated systems at companies everywhere to pull and install the bad version before anyone can react. If you or your team runs axios: lock your version to 1.14.0 (or 0.30.3 for the older branch). Change every password, API key, and access token on any machine that installed the compromised update. And check your network logs for connections to sfrclak dot com or the IP address 142.11.206.73.
Feross@feross

🚨 CRITICAL: Active supply chain attack on axios -- one of npm's most depended-on packages. The latest axios@1.14.1 now pulls in plain-crypto-js@4.2.1, a package that did not exist before today. This is a live compromise. This is textbook supply chain installer malware. axios has 100M+ weekly downloads. Every npm install pulling the latest version is potentially compromised right now. Socket AI analysis confirms this is malware. plain-crypto-js is an obfuscated dropper/loader that: • Deobfuscates embedded payloads and operational strings at runtime • Dynamically loads fs, os, and execSync to evade static analysis • Executes decoded shell commands • Stages and copies payload files into OS temp and Windows ProgramData directories • Deletes and renames artifacts post-execution to destroy forensic evidence If you use axios, pin your version immediately and audit your lockfiles. Do not upgrade.

English
50
610
3.6K
658.9K
Anonymous Quant
Anonymous Quant@AnonymousQuant·
@olvehe The fund is currently taking on new investors. $100M minimum to open a new account. DMs open
English
0
0
0
1
Anonymous Quant
Anonymous Quant@AnonymousQuant·
@MMT_Official_ Are you guys planning to expose a developer API at all so I can bring my own data?
English
0
0
0
102
MMT
MMT@MMT_Official_·
Weekend prep sta......wait what??
English
28
18
350
76.1K
dex
dex@dexhorthy·
@loss_gobbler do you feed that 3000 line spec to your agent? that's gotta be 50%+ of your context window no?
English
7
0
9
1.8K