"Do not be surprised if LessWrong gets hacked" by RobertM
APR 9, 20267 MIN
"Do not be surprised if LessWrong gets hacked" by RobertM
APR 9, 20267 MIN
Description
Or, for that matter, anything else. This post is meant to be two things: a PSA about LessWrong's current security posture, from a LessWrong admin[1]an attempt to establish common knowledge of the security situation it looks like the world (and, by extension, you) will shortly be in Claude Mythos was announced yesterday. That announcement came with a blog post from Anthropic's Frontier Red Team, detailing the large number of zero-days (and other security vulnerabilities) discovered by Mythos. This should not be a surprise if you were paying attention - LLMs being trained on coding first was a big hint, the labs putting cybersecurity as a top-level item in their threat models and evals was another, and frankly this blog post maybe could've been written a couple months ago (either this or this might've been sufficient). But it seems quite overdetermined now. LessWrong's security posture In the past, I have tried to communicate that LessWrong should not be treated as a platform with a hardened security posture. LessWrong is run by a small team. Our operational philosophy is similar to that of many early-stage startups. We treat some LessWrong data as private in a social sense, but do [...] ---Outline:(01:04) LessWrongs security posture(02:03) LessWrong is not a high-value target(04:11) FAQ(04:29) The Broader Situation The original text contained 6 footnotes which were omitted from this narration. ---
First published:
April 8th, 2026
Source:
https://www.lesswrong.com/posts/2wi5mCLSkZo2ky32p/do-not-be-surprised-if-lesswrong-gets-hacked
---
Narrated by TYPE III AUDIO.