A Boy That Cried Mythos: Verification Is Collapsing Trust in Anthropic

flyingpenguin.com

64 points by taejavu 4 hours ago


solenoid0937 - 3 hours ago

"Sonnet sees the same two “obvious” bugs. It just cannot close the exploitation step. Mythos’s entire frontier advantage over the prior model is therefore bupkis."

What a bizarre conclusion. It "just" cannot close the exploitation step? "Just?"

Developing the working exploit is the hardest part, not finding the bugs. A self-proclaimed security professional should know this.

How is this stuff even making it to the top of HN? Is it just the trendy Anthropic hate? I wonder if these folks will publicly walk back their statements if Mythos turns out to be legit.

baq - 3 hours ago

I wouldn’t be surprised if the glasswing thing comes with an NDA akin to what the NSA wants you to sign when you join. That would be the Anthropic-optimistic interpretation of the sound of crickets from participants - and ‘responsible disclosure’ would be an ok-ish reason for Anthropic itself to not publish what they found themselves alone.

If it’s indeed as bad as the article says it’s going to be a (yet another) PR disaster, but it won’t matter one bit as the whole industry is compute-constrained, not reputation-constrained. You’ll shout at clouds and them and their competitors and still be paying for tokens.

lubujackson - 3 hours ago

Apparently this doom marketing strategy is working for landing enterprise deals, but boy these AI companies are stirring up consumer hate and fear.

I think the real purpose of the Mythos security sham is to mask that Anthropic simply can't release their new model because their data centers are already on fire. There are so many other red flags pointing to this: the no-Claude-Code-for-Pro-users "test", the AWS data center rental deal, the fact Microsoft rug pulled hard on Copilot, specifically removing Opus... and that's just the past 2 days?

- 3 hours ago
[deleted]
vidarh - 3 hours ago

> The 244-page technical artifact, the thing that would have to survive peer review, refuses to actually quantify.

In what world does this author live where the system card is meant to be a scientific paper?

It's worth being skeptical, but it's nonsense to assume that the system card is meant for him or anyone to be able to reproduce and determine what the model actually did or did not. We won't know that until it is actually available.

mirashii - 3 hours ago

How about the boy who called nonsense security vulnerabilities. This is the same author who posts with incredulity that the ability to change a config file with a shell command in it gives you the ability to run the shell command you posted and wants it treated as some big CVE. Absolutely inconceivable that you might already have your harness in a sandbox where this is okay, and inconceivable that anyone might have a threat model that says that someone who can edit configuration of a tool can make that tool do arbitrary things allowed by its config.

https://www.flyingpenguin.com/ox-security-report-anthropic-m...

avalys - 3 hours ago

Am I supposed to know what a “system card” is?

- 3 hours ago
[deleted]