This website requires javascript to properly function. Consider activating javascript to get access to all site functionality.
LESSWRONG
Tags
LW
Login
Computer Security & Cryptography
•
Applied to
gamers beware: modded Minecraft has new malware
by
the gears to ascension
20h
ago
•
Applied to
Lesswrong can, and should, become a hacker community
by
trevor
9d
ago
•
Applied to
Using GPT-Eliezer against ChatGPT Jailbreaking
by
RogerDearnaley
17d
ago
•
Applied to
Transformer Architecture Choice for Resisting Prompt Injection and Jail-Breaking Attacks
by
RogerDearnaley
18d
ago
•
Applied to
Microsoft and Google using LLMs for Cybersecurity
by
Phosphorous
21d
ago
•
Applied to
AI interpretability could be harmful?
by
Roman Leventov
1mo
ago
•
Applied to
Preventing AI Misuse: State of the Art Research and its Flaws
by
Madhav Malhotra
2mo
ago
•
Applied to
Upskilling, bridge-building, research on security/cryptography and AI safety
by
Ruby
2mo
ago
•
Applied to
Cryptographic and auxiliary approaches relevant for AI safety
by
Allison Duettmann
2mo
ago
•
Applied to
The Virus - Short Story
by
Michael Soareverix
2mo
ago
•
Applied to
Boundaries-based security and AI safety approaches
by
Allison Duettmann
2mo
ago
•
Applied to
Reliability, Security, and AI risk: Notes from infosec textbook chapter 1
by
Akash
2mo
ago
•
Applied to
How security and cryptography can aid AI safety [sequence]
by
Allison Duettmann
2mo
ago
•
Applied to
AI infosec: first strikes, zero-day markets, hardware supply chains, adoption barriers
by
Allison Duettmann
2mo
ago
•
Applied to
POC || GTFO culture as partial antidote to alignment wordcelism
by
timot.cool
3mo
ago
•
Applied to
Hoarding Gmail-accounts in a post-CAPTCHA world?
by
Ruby
3mo
ago
•
Applied to
AI Governance & Strategy: Priorities, talent gaps, & opportunities
by
Akash
3mo
ago
•
Applied to
The 2/3 rule for multi-factor authentication
by
RomanHauksson
4mo
ago
•
Applied to
How Likely is Losing a Google Account?
by
Ruby
4mo
ago