Hacker Newsnew | past | comments | ask | show | jobs | submit | pants2's commentslogin

I do think you're right, custom software is now more viable for small companies, you'll see a lot of them hiring a SWE or two to build out custom tooling whereas before it didn't make financial sense since it needed a whole team.

Would love just for fun to feed this through an image generator to make it look like satellite imagery or maybe even Google Maps.

Not related to this project but you might like this map from the ArdaCraft project https://www.micahvanderlugt.com/middle-earth-3d

Hey @pants2, I put something together for you. It's pretty rough, but if you take the time to respond here, that will be the motivation I need to clean this up and make it work properly. https://middle-earth-interactive-map.web.app/index.html?view...

Hi @frasermarlow, this is a nice start! Of course the water here is land which is an issue, but I think it's fun. I think the brown color of the map made it all desert when it should probably be more New Zealand - like. Might not be super doable with img2img but I'll definitely check out any other attempts!

Yep. When I get some time I will do a metadata layer to clarify water vs land vs prairies vs forest etc... then I will rerun the process with that additional Context. Should be fun. Thanks for the suggestion.

Oof, zooming in on Fangorn Forest set off my trypophobia!

The original map was found here: https://www.reddit.com/r/lotr/comments/18fy0ga/middleearth_m... - give it a whirl!

The Bitcoin “value overflow incident” on August 15, 2010 is probably the closest thing and that didn't affect the price much (though one BTC was around 8c at the time)

This time you'll have hundreds of billions of BTC that will be hacked by someone who will probably instantly unload it. In that scenario it's hard to see the price of it not dropping >90%, so you'd have to think people would prefer a roll back.

That said, I don't know how you could even do a roll back, you're not rolling back to a 'safe' state since the keys aren't safe at that point.


Very good point on the roll-back.

However in terms of the hack, Bitcoin is slow - most exchanges require a few confirmations so it's 30+ minutes to land a deposit in Coinbase/Binance at minimum, and a transfer that huge would instantly set off alarms. Seems unlikely that they would be able to unload that much.


Coinbase would definitely go into buy-only mode during a major crash but that just means people would scream while they watch futures/perps go to zero.

"If you're first out the door, that's not called panicking."


"Instantly" being at least ten minutes (average) in this case.

Microstrategy is already pushing/funding quantum resilience for Bitcoin, so yes!

Murmur BS aside - holy shit, they had to abandon two C-130 class planes because they got stuck in the mud? And lost an A-10 Warthog on top of the original F-15?

This looks like a massive fuckup!


"Many people said Jimmy Carter knew how to fuck up in Iran, but those people never met me because I am the world's greatest expert in fucking up in Iran, and there will be so much fucking up you'll get sick of me fucking up."

The MC-130s, too - that's a variant that can be outfitted with the Metal Gear Solid-style fulton extraction.

It might be the Kojima in me speaking, but if this was a raid on Ishfahan then they might have planned to fulton out the centrifuges from a safe distance: https://en.wikipedia.org/wiki/Fulton_surface-to-air_recovery...


It would certainly be good news for cybersecurity employment!

Software security heavily favors the defenders (ex. it's much easier to encrypt a file than break the encryption). Thus with better tools and ample time to reach steady-state, we would expect software to become more secure.

Software security heavily favours the attacker (ex. its much easier to find a single vulnerability than to patch every vulnerability). Thus with better tools and ample time to reach steady-state, we would expect software to remain insecure.

If we think in the context of LLMs, why is it easier to find a single vulnerability than to patch every vulnerability? If the defender and the attacker are using the same LLM, the defender will run "find a critical vulnerability in my software" until it comes up empty and then the attacker will find nothing.

Defenders are favored here too, especially for closed-source applications where the defender's LLM has access to all the source code while the attacker's LLM doesn't.


You also need to deploy the patch. And a lot of software doesn't have easy update mechanisms.

A fix in the latest Linux kernel is meaningless if you are still running Ubuntu 20.


It's not because fixes get backported.

That generally makes sense to me, but I wonder if it's different when the attacker and defender are using the same tool (Mythos in this case)

Maybe you just spend more on tokens by some factor than the attackers do combined, and end up mostly okay. Put another way, if there's 20 vulnerabilities that Mythos is capable of finding, maybe it's reasonable to find all of them?


From the red team post https://red.anthropic.com/2026/mythos-preview/

"Most security tooling has historically benefitted defenders more than attackers. When the first software fuzzers were deployed at large scale, there were concerns they might enable attackers to identify vulnerabilities at an increased rate. And they did. But modern fuzzers like AFL are now a critical component of the security ecosystem: projects like OSS-Fuzz dedicate significant resources to help secure key open source software.

We believe the same will hold true here too—eventually. Once the security landscape has reached a new equilibrium, we believe that powerful language models will benefit defenders more than attackers, increasing the overall security of the software ecosystem. The advantage will belong to the side that can get the most out of these tools. In the short term, this could be attackers, if frontier labs aren’t careful about how they release these models. In the long term, we expect it will be defenders who will more efficiently direct resources and use these models to fix bugs before new code ever ships. "


This is only true if your approach is security through correctness. This never works in practice. Try security through compartmentalization. Qubes OS provides it reasonably well.

I don't think this is broadly true and to the extent it's true for cryptographic software, it's only relatively recently become true; in the 2000s and 2010s, if I was tasked with assessing software that "encrypted a file" (or more likely some kind of "message"), my bet would be on finding a game-over flaw in that.

This came across as so confident that I had a moment of doubt.

It is most definitely an attackers world: most of us are safe, not because of the strength of our defenses but the disinterest of our attackers.


There are plenty of interested attackers who would love to control every device. One is in the white house, for example.

Pricing for Mythos Preview is $25/$125 per million input/output tokens. This makes it 5X more expensive than Opus but actually cheaper than GPT 5.4 Pro.

Important to note it's only for participants, not the general public.

I'm just curious, where did you find this? (my memory wants to say, the leaked blog post, but, I don't trust it)


Duh, thanks :)

We're gonna need some new benchmarks...

ARC-AGI-3 might be the only remaining benchmark below 50%


Opus 4.6 currently leads the remote labor index at 4.17. GPT-5.4 isn't measured on that one though: https://www.remotelabor.ai/

GPT 5.4 Pro leads Frontier Maths Tier 4 at 35%: https://epoch.ai/benchmarks/frontiermath-tier-4/


Humanity's Last Exam (HLE) is already insanely difficult. It introduces 2,500 questions spanning mathematics, humanities, natural sciences, ancient languages, ...

Here is an example question: https://i.redd.it/5jl000p9csee1.jpeg

No human could even score 5% on HLE.


I've never understood the point of things like HLE, it doesn't really prove or show anything since 99.99% of humans can't do a single question on this exam.

That is, it's easy to make benchmarks which humans are bad at, humans are really bad at many things.

Divide 123094382345234523452345111 by 0.1234243131324, guess what, humans would find that hard, computers easy. But it doesn't mean much.

Humanity's last exam (HLE) couldn't be completed by most of humanity, the vast majority, so it doesn't really capture anything about humanity or mean much if a computer can do it.


the point is that each question is something that a specialist in a field would be able to do, but deems challenging enough that the ability to solve it would imply significant general usefulness in that domain

I mean they could just feed the solutions into the training data. Then suddenly the bot will do real good at HLE.

Removed the ring. Just watching three movies of Frodo and friends living life in Hobbiton.

Reminded me of "Garfield Minus Garfield" - https://garfieldminusgarfield.net/

"""

Garfield Minus Garfield is a site dedicated to removing Garfield from the Garfield comic strips in order to reveal the existential angst of a certain young Mr. Jon Arbuckle. It is a journey deep into the mind of an isolated young everyman as he fights a losing battle against loneliness and depression in a quiet American suburb.

"""


Removed the zombies. Just a guy in a sheriff's hat losing every group vote on where to camp next.

Removed the island. Now it's just a surgeon, a lottery winner, and a man carrying 40 knives all trying to get through TSA.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: