Brutkey

Darren Meyer :donor:
@darrenpmeyer@infosec.exchange
Darren Meyer :donor:
@darrenpmeyer@infosec.exchange

Musk figured out that you can make wild AI promises and get money whether those promises are accurate or not. He said every year we're on the cusp of ubiquitous driverless cars, but we're actually not all that close (even if we'll get there eventually) – Gary Marcus #BHUSA #LivePost

Darren Meyer :donor:
@darrenpmeyer@infosec.exchange

Neural networks have had all the funding, but symbolic AI systems (like GPS!) have a ton of value. They're not in competition, they're complementary – Gary Marcus #BHUSA #LivePost

Darren Meyer :donor:
@darrenpmeyer@infosec.exchange

There hasn't been a fundamentally new invention or discovery in AI since 2017: everyone is following more or less the same formula. – Gary Marcus #BHUSA #LivePost

Darren Meyer :donor:
@darrenpmeyer@infosec.exchange

"These [LLM] systems actually don't understand what it takes to write secure code" – Gary Marcus #BHUSA #LivePost

Darren Meyer :donor:
@darrenpmeyer@infosec.exchange

LLMs are not nearly as smart as they pretend to be: they're advanced mimics. – Gary Marcus #BHUSA #LivePost (NB: thank you, so many people don't understand this and it's so nice to hear an expert say it bluntly)

Darren Meyer :donor:
@darrenpmeyer@infosec.exchange

LLMs might play some role along the path to AGI (Artificial General Intelligence) — we don't know how that will pan out — but it isn't AGI itself. Even the industry is quietly retreating from AGI claims. – Gary Marcus #BHUSA #LivePost

Darren Meyer :donor:
@darrenpmeyer@infosec.exchange

Cognitive scientist Gary Markus: Cybersecurity, AI, and Our Brains. #BHUSA #LivePost

Read whole thread on one page:
https://mastoreader.io/?url=https%3A%2F%2Finfosec.exchange%2F%40darrenpmeyer%2F114983710927359345

Darren Meyer :donor:
@darrenpmeyer@infosec.exchange

Some takeaways – Lynch & Harang #BHUSA #LivePost

Darren Meyer :donor:
@darrenpmeyer@infosec.exchange

"AppSec still exists": we have to do basics like staying on top of vulnerabilities, following secure design principles, and defense in depth. These raise complexity for attackers.

"LLM powered software is still software" – Lynch & Harang
#BHUSA #LivePost

Darren Meyer :donor:
@darrenpmeyer@infosec.exchange

"Always treat LLM output with skepticism; use citations, educate users" – Lynch & Harang #BHUSA #LivePost