Transcripts

Security Now 1077 Transcript

Please be advised that this transcript is AI-generated and may not be word-for-word. Time codes refer to the approximate times in the ad-free version of the show.

Leo Laporte [00:00:00]:
It's time for Security Now. Steve Gibson is here. He is armed with the knowledge that Google is now downloading 4.7 gigabytes. When you download Chrome, what is it? A local AI model. Steve talks about its implications. Next on Security now,

TWiT.tv [00:00:18]:
podcasts you love from people you trust.

Leo Laporte [00:00:22]:
This is Twit. This is Security now with Steve Gibson. Episode 1077, recorded Tuesday, May 5, 2026. A browser AI API. It's time for Security Now. Yes, it's Tuesday. Yes, I am not in my studio. I am in beautiful Hawaii, the Big Island.

Leo Laporte [00:00:49]:
But that doesn't mean I'm not going to get Steve Gibson on the horn and talk about security, because I know you need your fix. Hello, Mr. G. You know, Leo, you

Steve Gibson [00:00:58]:
look a little more tan. We saw you.

Leo Laporte [00:01:01]:
I am. See, my, my. My hand is light, but my face is a little dark.

Steve Gibson [00:01:06]:
Do my ties increase skin pigmentation?

Leo Laporte [00:01:09]:
Maybe that's what it is. Maybe that's what it is. Something. Yeah, we were on vacation, but I can't, you know, I still want to do the shows, and so I've set up. If. If you could only see this cookie setup. I am outside on the lanai.

Steve Gibson [00:01:23]:
We hear the. The exotic birds tweeting in the back.

Leo Laporte [00:01:27]:
There are some exotic birds there. Birds. There's house sparrows and there's a bird that looks like a little chicken called. I can't remember the name of it, but chicken, bird, chicken bird. And it's very noisy, so you'll know if it decides. But the sparrows are very aggressive. They might think I have something to give them, so they might be coming up here and sitting on my shoulder.

Steve Gibson [00:01:49]:
Well, it all adds to the ambiance that that's it we have with you and Lisa in the Big Island.

Leo Laporte [00:01:56]:
It's so beautiful. Have you been to Hawaii, Steve?

Steve Gibson [00:01:59]:
Oh, yeah. I had half of my second half of my honeymoon in Hawaii.

Leo Laporte [00:02:03]:
I love Hawaii.

Steve Gibson [00:02:04]:
I do.

Leo Laporte [00:02:05]:
So what's coming up on Security now this week?

Steve Gibson [00:02:08]:
So episode 1077. It's funny, every so. Every so often, I think about 1077, which sort of puts the infamous 999 into context.

Leo Laporte [00:02:19]:
Yeah.

Steve Gibson [00:02:20]:
Now, it's been a while. Yeah. Actually, it's been 777 whiles. Yeah. So there were two main topics which were contesting for to win the coveted title of the podcast this week. Google's arguably premature move to build AI into Chrome ended up winning because Mozilla has said, not so fast, but we got a lot of good things to talk about. Turns out that some hackers used AI to Code up a portal for credit card stolen credit card verification. They forgot to ask it to add authentication, so Whoops.

Steve Gibson [00:03:16]:
Also the UK's security group, the NCSC has issued their own Mythos warning which caused me to wonder where is cisa? Why, why haven't you heard anything from cisa? We're going to, we're going to touch on that. We've got another of many recent Linux local privilege escalations. This one is bad and it's affected Linux for years. And yes, AI found it. Also some interesting commentary about the ground shifting of under AI and vulnerability research, how it's looking like it may spell the end of bug bounties and why that is probably the right thing to have happen. Also, Anthropic has released what they call Claude Security as a mini mythos. ChatGPT has made some changes which demonstrate it's getting very serious about login security. I want to make a comment about something I discovered since we last talked about the end of life of Sync Trezor version 1, which is what I use to sort of bundle sync thing into a nice little applet for Windows, but there's a replacement for it.

Steve Gibson [00:04:39]:
And then we're going to talk about how Google has sort of surprised everyone by just saying we think it's time that we add AI to support in JavaScript. So lots of fun things to talk about and of course a great picture of the week. So yeah. Oh, and there are a couple things that happened just now just so that our listeners know that I'm aware of the fact that Digicert suffered a major breach.

Leo Laporte [00:05:07]:
Oh.

Steve Gibson [00:05:08]:
Which allowed 30 EV code signing certificates to get minted behind their back.

Leo Laporte [00:05:16]:
Oh, that's not good.

Steve Gibson [00:05:17]:
And used. However, their disclosure is being called a reference, a state of the art. This is the way you do it. If you're gonna, if you're gonna say what happened, if you're gonna share with the industry your, your post mortem. So they just updated it 10 minutes ago so it's still a little bit in flux. We'll take a look at what they had to say, things that went right, things that went wrong and what they learned. It ended up being a social hack, a malicious screensaver of all things got into two of their tech support member PCs and it wasn't detected due to a crowdstrike endpoint security misconfiguration. So anyway, I'm all up to speed on it, but I just didn't have time.

Steve Gibson [00:06:06]:
I didn't have a chance to. Well, actually we're still learning a lot and it's still in flux. So we'll have good coverage of that next week. I just want to let everybody know that I was aware of that. So we'll take our first break, we'll look at the picture of the week, and then we'll get into all this.

Leo Laporte [00:06:20]:
It really just shows you how anybody is vulnerable to this. And as you said when we were at the threat locker zero trust world, the threat's coming from inside the house, a network engineer who put a screensaver on his system, and suddenly you're compromised. That's. That's terrible. You know, just to explain behind the scenes, we weren't sure this was going to work at all. And so we thought, well, I better pre record the commercials in case, I don't know, Micah had to jump in or something. And I brought a Starlink mini and all sorts of backup stuff. And it turned out, wow, who knew in Hawaii they've got cable modems, high speed Internet.

Leo Laporte [00:06:59]:
I didn't need to bring anything. I'm just.

Steve Gibson [00:07:01]:
So it isn't a complete proof of concept of your ability to roam through, like, anywhere in the online. The globe and use.

Leo Laporte [00:07:10]:
Not yet. Not yet. I probably should, though, you know, set it up. We have this nice lawn behind us. There's plenty. It's perfect space for the Starlink. So I probably should just set it up before I go home and. And make sure that I could do that.

Leo Laporte [00:07:23]:
But, you know, everybody could double as

Steve Gibson [00:07:25]:
a bird bath, couldn't it?

Leo Laporte [00:07:27]:
Yes, it could. Or a serving tray. All right, I have. Now this is going to be another interesting experiment. I have the picture of the week. Shall we share it?

Steve Gibson [00:07:38]:
So this was great. Shared from a listener, of course. As. As are they all. I gave this one the caption attempting to preempt the inevitable question, why has the lobster become so expensive? Okay, so we see a sign.

Leo Laporte [00:07:58]:
All right, I had seen the lobster part, but I hadn't seen the rest of it. That's hysterical.

Steve Gibson [00:08:03]:
The sign is taped to the window of a buff or a restaurant or something, explaining, just again, preempting the inevitable question. So the sign says, all lobster prices have increased due to higher lobster prices.

Leo Laporte [00:08:21]:
And I can see in the background there's a. Okay, a little old lady, an elderly person, and, you know, she went up to the guy at the restaurant, said, why are the lobster prices so high? And he just pointed to the sign. He said, ladies. Yeah, because they're so.

Steve Gibson [00:08:37]:
Read the sign. That's right. All lobster prices have increased due to high lobster prices.

Leo Laporte [00:08:43]:
Very nice. Very nice.

Steve Gibson [00:08:45]:
What Are you gonna do okay? So we begin this week with a story that intersects several security fronts. Last Wednesday, Cyber News headline was Scammers Vibe code server to verify stolen credit cards leak details of 345,000 cards. I had to read that one twice to make sure I understood what they were saying. So here's what they discovered. They wrote, threat actors, like so many programmers around the world, are no strangers to AI assisting in their operations. However, like so many Vibe coders, scammers also run into security issues. On April 16, the Cyber News research team discovered an exposed server owned by a threat actor. The exposed information is controlled by a carding market called Jerry's Store, as in Tom and Jerry.

Steve Gibson [00:09:42]:
There were some little cartoons of a mouse jumping around on things on and posted on the Dark Web. They said the tool provides credit card validity percentages for each seller. In other words, threat actors use this tool to check if the stolen payment card is still operational. According to our team, Jerry's Store operators extensively used Cursor, an AI assisted development environment. In fact, it was one of the very earliest AI based coding assistants from several years back. Cursor, they said, to set up the leaking server and to not knowing that it was leaking and to create administrator facing dashboards. Cursor, they wrote, is a legitimate service developed by the US software company Any Sphere. Researchers believe that relying on an AI assistant to set up the server was the reason it was exposed.

Steve Gibson [00:10:42]:
Based on the chat logs our team was able to access, the threat actor received flawed instructions from their AI. Imagine that for building the dashboards, the team explained, quote, we were able to confirm the leak originated from the user asking to create a statistics dashboard. And Cursor created an unauthenticated open web directory to serve the web page, ignoring the need because of course you didn't ask for it. Ignoring the need to set up authentication or ensure that only the intended dashboard would be accessible. In other words, it's just like a regular user. If you don't ask for authentication, you're not going to get authentication anyway, they finished saying. Moreover, the chat history reveals there was sufficient information for the Cursor large language model to identify that it was helping set up a credit card verification service, indicating a lack of sufficient guardrails to prevent abuse. And as you've often heard me say, I don't think you can really control a large language model.

Steve Gibson [00:11:51]:
Researchers said, quote, it's a lesson for developers using Cursor for legitimate uses, showing how it can lead to accidental data leaks. Right? It's just going to Write what you ask it to. It's not going to like be your security nanny. So Cyber News said that they'd reached out to Cursor for comment and would update their article with any additional information they receive. The fact that the Cursor AI produced a statistics dashboard driven by an unsecured and open web directory allowing unauthenticated remote access. I think it's a great example of the danger of using AI without being a domain expert, that is, you know, without knowing what to ask for because you, you know, it'll give you what you ask for, but you need to know what that is. I have no doubt that the Cursor AI would have easily provided instructions for the authentication that was needed if it had been asked to. But apparently the bad guys never thought to ask.

Steve Gibson [00:12:57]:
So somebody who wasn't really up to speed on web based application security could easily fall, you know, or fail to anticipate all the various ways others might access and penetrate their system. So, you know, use expecting AI to produce secure solutions by default, it's probably a fool's errand in this case. Either it never occurred to them that authentication should be required where it was absent, or they didn't know it was going to be absent, or they assumed that the AI would know, you know, like, what it should do and would do it without bidding. The Cyber News article also provided some interesting background reporting a little bit on the underground industry in stolen credit cards, which I thought was interesting. They wrote, operations such as Jerry's Store are integral to the cybercrime infrastructure. Once scammers obtain stolen credit card information, they need to verify which cards can still be exploited. Jerry's Store provides that service. Our team noticed that to complete the task, Jerry's Store operators use legitimate, well known merchants.

Steve Gibson [00:14:15]:
The Cyber News team explained, quote, threat actors used multiple legitimate merchant websites such as Amazon us, Amazon Japan, grubhub, Sam's Club, Temu, Lyft, Elf Cosmetics and countrymax. Utilizing hundreds or in some cases thousands of accounts that have already been established on these platforms to perform credit card validity checks, attackers created those accounts to register stolen cards and then perform low risk actions as they called them. These could include adding cards as a payment method or making a very small purchase if the platform accepts the card. Threat actors mark the card as valid and sell it to other threat actors on the dark web. Using large merchants like Amazon or grubhub of course, is a way to mask their activity since large merchants process billions of payments to tiny transactions on a well known website. Don't Ring any alarm bells? They wrote. According to our team, the exposed server contained a treasure trove of credit card details. Details meaning you know, everything you need to process someone's card.

Steve Gibson [00:15:29]:
Researchers identified nearly 200,000 credit card details that the service had verified as valid and over 145 accounts. I'm sorry, 200,000 that were invalid and over 145,000 accounts that they had verified as valid. Now the exposed information includes all the details that you need. Credit card numbers, expiration dates, the security code, the cardholder's name and their address. Typically, they wrote, valid credit card details are sold for between $7 and $18 each on the Dark Web, meaning that the value of the valen, the valid stolen card data, that's the 145,000 cards that are, that have been verified there is somewhere between a million and $2.6 million, they said. However, our team added that the actual value of the exposed infrastructure may be a lot higher since Jerry's store sells much more than just credit card data. That's just one of the types of, you know, fraud that they're, that they're there making available in the store, they said. While it's unclear where Jerry's store is located, internal tooling and leaked large language model chat logs suggest that the Marketplaces administrator is fluent in Chinese.

Steve Gibson [00:16:56]:
The server itself appears to be hosted in Germany by a suspected bulletproof hosting provider, the Marketplace, which. Yeah, the Marketplace, which launched in late 2023, is a well known credit card vetting tool within the cybercrime underground, aimed primarily at cards stolen from victims in the US and the eu.

Leo Laporte [00:17:17]:
Fluent in Chinese but not AI, apparently. You know, this comes up a lot. We're going to see more of these. Whoops. Whoa. So hold on camera, I'm over here. Thank you.

Steve Gibson [00:17:29]:
Nice.

Leo Laporte [00:17:30]:
People blame AI for stuff that they do that's dumb. There was a big story last week and everybody blamed AI because the guy's database, production database got clobbered. But of course, if you give AI the keys to your production database, it's on you, my friend. And if you're dumb enough to say, hey, just make me a website to authenticate, but, but don't put any authentication layers in there, AI is going to do what you say. I think this comes from sort of a magical belief about AI that it's somehow intelligent or you know, it's going to take care of you and it's not.

Steve Gibson [00:18:08]:
And probably it's a hope as much as I believe. Yeah, like I hope that AI knows how to do this. And since it seems to know a lot, I'm just going to assume that it does.

Leo Laporte [00:18:21]:
Well, it does. If you tell it to, it will. I mean, you're absolutely right. If you say AI is great at OAuth. If you say write the login page, use OAuth, make it secure, it will absolutely do that. But you have to tell it to. It's not going to assume that. It might, but again, it might not.

Leo Laporte [00:18:36]:
The other, the other thing I wanted to mention is I have had credit cards stolen due to my own stupidity. And the very first of all, credit card companies know to look for those low risk, low value charges, you know?

Steve Gibson [00:18:49]:
Right.

Leo Laporte [00:18:49]:
In fact, they used to say if somebody buys sneakers and then tries to fill up a tank of gas, they invalidate that credit card immediately because that's the first thing somebody steals a credit card is going to do. That's. Times have changed. That's not true anymore. When I credit, my credit card was stolen. I mentioned this before. They added it to an Apple Wallet. So they had a prior set up Apple account and added it to an Apple Wallet, which they then used the credit card through obscuring the source of the credit card, the actual credit cards.

Leo Laporte [00:19:20]:
Very, I thought, very clever. And I should have known because when I gave it the six digit code, it said, okay, we're trying to add this to that Apple wallet. And I said, what are you talking about? I'm not trying to do an Apple Wallet. That should have been the hint to me that they were doing something funny there. You know, it's a cat and mouse, Tom and Jerry kind of a game.

Steve Gibson [00:19:41]:
Yeah, it does feel like, as I have said on the podcast before for like in the early days, probably almost before this podcast, I used to fly up to Northern California to, to visit my family in Northern California for the holidays. And, and this was, you know, pre Expedia and so forth. So I actually had a travel agent from the old, old, old days who I just kept around and, and when we would have our conversation, she would invariably say, well, so Steve, do you have the same credit card or have you lost that one too? Because I was out on the Internet poking around and it's like, oh yeah,

Leo Laporte [00:20:23]:
I don't feel so bad now.

Steve Gibson [00:20:26]:
I did lose that one. So, okay, so last Friday, Ali Whitehouse, the chief technology officer, you know, the CTO for the UK's NCSC, their National Cybersecurity center, issued a clear warning at the level of the government. Ali's warning posting was titled Preparing for a Vulnerability Patch Wave and it carried the tagline. Organizations must act now to prepare for a wave of patches that will address decades of technical debt. And I love that term in this, in this instance, I think the term technical debt is exactly the right way to express the concept that, you know, the piper may be about to get paid. I have a friend from the Midwest whose favorite term for this would be. They're about to get their just comeuppance. Yes, comeuppance, indeed.

Steve Gibson [00:21:30]:
So here's what the UK's NCSC CTO wanted everyone within the United Kingdom within his his sphere of influence to appreciate. He wrote, Whether they are technology producers and vendors or consumers and operators, all organizations have technical debt, a backlog of technical issues that's both expensive and time consuming as a result of prioritizing short term gains over building resilient products. Artificial intelligence, when used by sufficiently skilled and knowledgeable individuals, is showing the ability to exploit this technical debt at scale and at pace across the technology ecosystem. As a result, the NCSC expect there will be a forced correction, which is the way he phrased it, we're going to have a forced correction to address this technical debt across all types of software, including open source, commercial, proprietary and software as a service. This is why we're encouraging all organizations to prepare now for when a patch wave arrives. A rush of software updates that will need to be applied across the technology stack to address the disclosure of new vulnerabilities. All organizations must take steps to identify and minimize their Internet facing and other externally exposed attack surfaces as soon as possible. As we've argued for some time, you should prioritize technologies on your perimeter and then work inwards, covering cloud instances and on premises environments.

Steve Gibson [00:23:18]:
By doing this, organizations can reduce the risk posed by latent vulnerabilities when they become known and exploited by attackers. Where organizations cannot apply updates across their entire environment, they should prioritize applying updates to their external attack surfaces. Where capacity extends beyond the external attack surface, organizations should prioritize critical security systems. It's also important for organizations to realize that patching alone will not always suffice. Some technical debt may be present in end of life or legacy technology that's out of support and so cannot receive updates. In such instances, organizations will need to replace technologies or bring them back within support, especially where it presents an external attack surface. Building on the principles contained within our vulnerability management guidance or guidance, organizations should make plans to deploy software security updates quickly, more frequently and at scale, including across their supply chains. We are expecting an influx of updates to address vulnerabilities across all severities and expect a number to be critical.

Steve Gibson [00:24:43]:
NCSC recommend that and they have three where automatic secure hot patching is available, that is patching that does not involve service disruption, this should be enabled as a priority. Okay, well that's you know, not hard to imagine as the first where automatic updates are available, including for embedded devices, this should be enabled to reduce the workload on support teams. So yeah, turn on automatic updates and go for it. And third, where neither of the above are available, organizations will need to ensure that processes and risk appetites support frequent and scaled updating. Noting the operational trade offs around disruption and safety critical systems, a risk prioritized approach such as the Stakeholder Specific Vulnerability Categorization system can be used to prioritize installing updates and then they continue. However, should a critical vulnerability be under active exploitation, especially one affecting an Internet facing system, then it is essential to accelerate the update process. Organizations can refer to the NCSC's new guidance on responding to active exploitation of vulnerabilities for more information. To summarize, you should put in place a policy to update by default where you always apply software updates as soon as possible and ideally automatically.

Steve Gibson [00:26:21]:
This should be at the core of your update management process, but we recognize it may not apply in some instances, such as for safety critical systems or operational technology. Patching alone won't address the systemic problems that my he he writes my previous blogs have addressed. I've appealed to technology producers and vendors to ensure systemic technical security debt is minimized by including, where appropriate, memory, safety and containment technologies. Similarly, for consumers and operators, a focus on cybersecurity fundamentals to raise resilience and to reduce the impact of breaches should be a priority. This includes adopting and fully implementing Cyber Essentials or the Cyber Assessment Framework for organizations operating essential services such as energy, health care, transport, digital infrastructure and government. Finally, prepare for the patch wave now. In conclusion, the NCSC advise all organizations, irrespective of size, to plan and prepare for the vulnerability patch wave. A good start is to is by reading the NCSC's updated vulnerability management guidance for larger organizations.

Steve Gibson [00:27:44]:
We also recommend working to gain assurance from your supply chains, both commercial and open source, so that they're prepared to navigate any required response. One thing that occurred to me as I was going through this is that in the name in the name of preparedness and this certainly applies to everybody in the UK and out this notion of of gaining assurance from your supply chains. I would say make sure that the providers of the equipment that you have on the edge which are under support which can obtain updates, make sure they've got a like a a a a greased path through, you know, into your email. Make sure that when they do notify you of updates that are available, it doesn't get routed to some we'll get around to it, you know, next month during our monthly review process. I would say, you know, given what we expect to have happening here over the next couple months, make sure that the communications inbound from the vendors that you are depending upon to have the most recent code running can get to you. And largely what I just shared from the ncsc, you know, it's a restating of what we already know right? At the same time for many of the CIOs and CSOs and IT heads in organizations throughout the UK where this has rain a clear statement and posting such as this can provide the coverage and the backup they may need to succeed in getting their organizations, you know, and the other C Suite executives to take this seriously to understand what is probably going to be happening shortly. And as I was seeing this Note from the UK's NCSC, I realized that I hadn't seen anything from our own CISA in the us and that struck me as odd since the SISSA we've all come to know would normally have been shouting about this from the mountaintops. So I went digging to see whether maybe I had missed that statement, which, you know, it seemed clear SISSA should have made in the wake of the Mythos revelations, I found A report published two weeks ago on April 21 by Axios, and it exactly addresses the question where CISA.

Steve Gibson [00:30:29]:
The reporting was posted as a scoop, titled Scoop. CISA lacks access to Anthropics Mythos and Axios explained, writing the Cyber Security and Infrastructure Security Agency. You know, CISA does not have access to Anthropic's powerful Mythos preview model, even though some other government agencies are using it. Two sources tell Axios this matters because the country's top cyber defense agency, tasked with helping to secure everything from banks to power plants, is on the outside looking in. At a time when the industries it works with are deeply concerned about AI powered cyber attacks overwhelming their defenses, Anthropic decided against a public release of Mythos. This is Axios bringing less informed readers up to speed. Anthropic decided against a public release of Mythos due to its unprecedented ability to quickly discover and exploit security vulnerabilities. Instead, Anthropic provided it to more than 40 companies and organizations who are now testing it and working to shore up their systems.

Steve Gibson [00:31:49]:
CISA is not on that list. Earlier this month, an anthropic official told axios the company had briefed CISA and the commerce department on mythos's capabilities. The commerce department's center for AI standards and innovation has reportedly been testing mythos so they have it. The NSA is also among the organizations using mythos, despite the department of Defense, which oversees the agency, having declared mytho anthropic is a supply chain risk, unquote. It's unclear if the ongoing turmoil within the agency during the second trump administration played any role in the agency not moving more swiftly to secure access. Spokespeople for cisa and anthropic both declined any comment for this reporting by axios. They wrote, the trump administration has spent the last year, as we know, reducing capacity at cisa Instead of opting to give more policy influence to the white house's national instead of. Of.

Steve Gibson [00:33:00]:
Of that, they have opted to give more policy influence to the white house's national cyber director and pushing some programs out to the state and local level. So trying to, you know, distribute this instead of having it as centralized as it had been under CISA. CISA's acting director, a guy named Nick Anderson, told lawmakers last week that the agency's resources are, quote, more limited than I would like, unquote. He said trump has proposed cutting as much as $707 million more from the agency's budget in the upcoming fiscal year. CISA has already lost more than a third of its workforce and millions of dollars in funding. National cyber director Sean karen cross is among the Trump officials negotiating broader civilian agency access to mythos. The treasury department has also been negotiating access. Sources tell axios that other organizations with access to mythos have predominantly been using it to find exploitable security vulnerabilities within their own networks and software.

Steve Gibson [00:34:11]:
Security teams at critical infrastructure organizations have often looked to CISA to share threat intelligence across their sectors and determine how to prioritize their security strategies. And as we know, those critical infrastructure organizations have. Have very much depended upon sisa, but also on that that that blanket of hold harmless so that they're free to disclose things they discover, which is still a little bit in limbo. So I heard. I hadn't heard about this acting sisa director Nick anderson. So I checked him out and he appears to be imminently competent and qualified. He's a decorated u. S.

Steve Gibson [00:34:58]:
Marine corps veteran who served as cio chief information officer for navy intelligence and head of the office of intelligence, surveillance and reconnaissance systems. And Technologies at the U. S. Coast Guard. He served in on active duty managing intelligence mission systems in Iraq, Europe and Africa, and is a veteran of the Operation Iraqi Freedom. He served as Principal Deputy Assistant Secretary at the Department of Energy's Office of Cybersecurity, Energy Security and Emergency Response, where he led national efforts to secure US energy infrastructure. He also served as federal cybersecurity lead and Senior Cybersecurity Advisor to the Federal CIO at the White House Office of Management and Budget. So, you know, this guy's, you know, he, he's certainly competent to be on top of sisa.

Steve Gibson [00:35:52]:
I've got no complaints. With Nick's background, it appears what he needs is more resources and support and that sisa's lack of access to Mythos is largely due to the, as we're now calling it, the War Department's unfortunate feud with Anthrop. Anthropic. Anthropic made clear in 2025, at the time that it signed its contract with the Pentagon, that it did not want its AI technology to be used for mass surveillance of people within the United States or for fully autonomous weapons systems, as we know then. Subsequently, the Department of War demanded that Anthropic drop those restrictions, and Anthropic refused to do so. They published a public statement explaining their position, you know, and regarding fully autonomous weapons. They wrote, frontier AI systems are simply not reliable enough to power fully autonomous weapons. And without proper oversight, fully autonomous weapons cannot be relied upon to exercise the critical judgment that highly trained professional troops exhibit every day.

Steve Gibson [00:37:07]:
Anthropic offered to work with the Department of War on R D to improve the reliability of these systems, but were turned down. So after that, in apparent retaliation and without any evidence, the Pentagon declared Anthropic suddenly to be a supply chain risk. And this is all very unfortunate since CISA should absolutely have access to Anthropic's Mythos. Preview. Hopefully, the White House's National Cyber Director, this Sean Karen Cross, who appears to understand the need, will be able to make something happen. You know, it's clearly ridiculous to have one of the US's leading AI firms frozen out of the government because as Secretary Pete Heth declared, it is woke AI, whatever that means in this context. For the time being, it appears that CISA is silent for purely political reasons.

Leo Laporte [00:38:04]:
This is really politics should not be in intrude into this at all. And unfortunately, very much has. I mean, SISA is in the doghouse because of what happened in 2020, right? Chris Krebs.

Steve Gibson [00:38:18]:
Right.

Leo Laporte [00:38:18]:
And now the White House is Saying they want approval of all future AI models, period. They're about to draft a proposal that AI models can't be released without government approval. This is exactly the wrong direction to take with this stuff.

Steve Gibson [00:38:33]:
Well, and I also did see that Anthropic wanted to do a second round. They wanted to expand their program by adding an additional 70 organizations that would have access to Mythos Preview. And the White House said no is like blocking their ability to incrementally roll this out. An incremental disclosure here is exactly what you want. You get the core 40, they have a month with it now and then, and then you widen the circle again and let another, you know, like, like next tier have access to it.

Leo Laporte [00:39:10]:
Yeah, this is, it's a little infuriating because political motivation and what's the right thing to do from a security point of view don't necessarily coincide and, and that's what you're seeing here. And it makes us all less safe, frankly.

Steve Gibson [00:39:26]:
Yeah. Okay, break time and then we're going to look at this newest Linux local privilege escalation and look at how AI is reshaping the bug bounty business.

Leo Laporte [00:39:37]:
Excellent. All right, Steve, on we go with security.

Steve Gibson [00:39:41]:
So the news late last week was of the discovery of another serious local privilege escalation discovered in the Linux kernel. And it had been there for a long time. And yes, before you ask, it was found by an AI vulnerability discovery system operated by a security firm named Theory. They wrote, quote, an unprivileged local user can write four controlled bytes into the page cache of any readable file on a Linux system and use that to gain root. A simple 732 byte line 9 line Python proof of concept has been posted to GitHub, which immediately elevates any normal user to root. And of course that's not something you want to leave unpatched. So this important and I'm sorry, this is important. And Linux distros, the ones that are for sure known, Debian, Ubuntu and Susie have immediately issued patches for the problem and overseers of many other distros have as well.

Steve Gibson [00:41:01]:
Red Hat initially said it was going to defer the fix, but then later changed its guidance to indicate that it will be going along with the other distros and will be patching promptly. The CVE has been rated as high severity at a 7.8 out of 10. And of course it's only. It's only, only. I mean, still, that's bad. 7.8, which is, you know, it's as bad as it gets. For a local privilege escalation. But the attacker first needs to get into a non root account where they're able to then execute this script in order to obtain elevation.

Steve Gibson [00:41:39]:
But on the other hand, anybody who has local access to a machine also is able to use this. So it's a complete breach of, of Linux security, you know, account security. At the end of one of the reports of this I ran across the statement AI assisted vulnerability research recently prompted the Internet Bug Bounty, that's ibb, the Internet Bug Bounty program, to suspend awards until it can understand how to manage the growing volume of reports. I thought that was interesting and it was news to me, so I went hunting. Here's what I found about that. Near the end of March, the Internet Bug Bounty program, which is run by HackerOne, paused their acceptance of new vulnerability submissions due to what HackerOne described as an increasing imbalance between vulnerability discoveries and the ability for open source maintainers to remediate them. And of course yes, AI is the underlying driver of all this. Okay, but let's for B, we'll back up a little bit.

Steve Gibson [00:42:54]:
Recall that the Internet Bug Bounty is a crowdfunded vulnerability reward program that was started 14 years ago back in 2012 and it's operated through the HackerOne platform. Its purpose and intent is to reward and thus incentivize independent security researchers to find and responsibly disclose vulnerabilities in widely used open source software. The funding for the program comes from a consortium of of major tech companies including Facebook, GitHub, Shopify, TikTok and others who all contribute to a shared bounty pool. The underlying idea is that since everyone depends on open source infrastructure, everyone should share in the cost of helping to secure it. And the vulnerability discovery payout structure is pretty simple. 80% of each awarded bounty goes to the researcher who reported the vulnerability, with the remaining 20% being contributed to the open source project itself where the trouble was found to support, you know, its repair and remediation. So that helps to fund the remediation work and, and makes the program go. It's been widely seen as a success, having paid out more than $1.5 million since the program began.

Steve Gibson [00:44:22]:
But almost predictably, AI has messed everything up. Hacker One stated quote, the discovery landscape is changing. AI assisted research is expanding vulnerability discovery across the ecosystem, increasing both coverage and speed. The balance between, between findings and their ability to fix them. You know, remediation capacity in open source has substantially shifted, so the problem is being called triage fatigue. And the trouble is not just the increased volume of reports that would be bad. What's interesting is it's not. It's also not the signal to noise ratio.

Steve Gibson [00:45:11]:
The actual problem is the nature of the noise. Weirdly, the quality of the noise, while still noise has increased. We all know Daniel Stenberg, the creator of Curl. He expressed it this way. He said more convincing crap is worse than obvious crap. You can't dismiss it quickly, you have to investigate it and you waste real time getting to the point where you can prove it's nonsense. At scale, this stops feeling like a helpful external contribution model and starts to resemble something closer to a denial of service attack on the people who are responsible for security. Which is like, yikes, a consequence of AI.

Steve Gibson [00:46:06]:
So 31 years ago, way turning the clock way back 31 years ago, in 1995, Netscape launched the first widely recognized paid bug bounty program offering to pay researchers back in 1995 for their responsible reporting of significant bugs, which they discovered in Netscape Navigator 2.0. So they were really ahead of the game at that point. Of course, they also had a web browser that was ahead of the game, and that model has been functioning vibrantly. The notion of paying researchers for responsibly reporting bugs they find been functioning ever since. So the notion of that AI may be driving a fundamental change to this long standing vulnerability discovery and reporting model is important enough, as I said at the top of the show, to be a contender for today's main topic. Except that the idea of Google going off half cocked and adding an explicit AI interface for JavaScript in Chrome that also needed ample discussion space today. And we're going to cover Mozilla's pushback against that at the end of the podcast. But meanwhile, the company Aikido, which is deep into automated vulnerability discovery as a business, recently interviewed not only Curls Daniel Stenberg, who I just quoted, but also Casey Ellis.

Steve Gibson [00:47:45]:
Casey's the founder of Bug Crowd, and as such is one of the people who helped establish and formalize the bounties for bugs. Starting back in 2012, Aikido titled their report Bug Bounty isn't Dead, but the Old model is Breaking. I'm going to share what he wrote and also what my intuition immediately suggests about the nature of the change. So they wrote Bug Bounty has been a very hot topic lately. We're seeing high profile programs go offline or fundamentally change the Internet. Bug bounty. One of the most important programs for open source programs is pausing submissions, Curl is removing payouts, and Node JS is removing its bounty entirely. That's not noise, that's signal.

Steve Gibson [00:48:42]:
We wanted to understand what where bug bounty is actually heading. So we sat down with two of the most credible voices on opposite sides of this conversation. Daniel Stenberg, creator of Curl, who's living the maintainer reality and recently halted bug bounty payments. And Casey Ellis, the founder of bugcrowd, one of the people who helped establish the model in the first place. What we found was that the bug bounty model is at a crossroads, and we're in the midst of a big shift. Before we get into where the model is headed, let's take a step back and understand why. It's been one of the most effective ideas in security over the last decade. It all stems from the idea of letting the Internet try to break your stuff before attackers do.

Steve Gibson [00:49:32]:
And it worked because it gave companies scale they could never hire. As Casey put it, if you're trying to outsmart a global pool of attackers with someone working 9 to 5, the math for that is wrong. They said. That's the magic of bug bounty. Instead of relying on a handful of internal people, you tap into a global pool of different skill sets, different perspectives, and different motivations, all attacking your system in ways your internal team never thought of. And that's without the significant overhead required to hire specialist experts internally and then work to keep them busy. All this explains why bug bounties became fundamental to modern security programs. What's changing now isn't is not the demand for security, it's the economics of how bug bounties operate.

Steve Gibson [00:50:33]:
AI has altered the balance, and not in a good way. Finding bugs is now cheaper than ever. Writing reports is even easier, and submitting them has become effectively frictionless. Meanwhile, the cost of validating those reports and then actually fixing the issues has not changed at all. Those final two required steps, validating and then fixing bugs, remains as labor intensive as ever. We are seeing this play out in practice. There are three types of report submitters. There are those companies that use a new approach for legitimate reports.

Steve Gibson [00:51:19]:
These are reports that use layered AI approaches that combine the strengths of multiple AI models, guardrails, orchestration and context, such as Aikido's own AI pen testing capabilities. And Aikido is of course plugging their own solution, as we would expect them to on their own website. But we know that Anthropic also set up their Mythos preview system to do the same. Both are discovering and importantly, verifying suspected vulnerabilities to produce much higher quality reports, which in the case of Mythos, include proofs of concepts, of exploits. Aikido continues enumerating these three classes of bug sources. So they, they, they said, then there are individuals who escalate their research and report writing using AI as a tool. And finally there are individuals who are able to upskill by virtue of these AI models. They generate reports that seem technically plausible but are still completely wrong.

Steve Gibson [00:52:32]:
Daniel described it perfectly and this is where he we we quoted him earlier saying more convincing crap is worse than obvious crap. They said you can't dismiss it quickly. You must investigate it right, because it looks real. And then you waste real time getting to the proof that it's nonsense. At scale, this stops feeling like a helpful external contribution model and starts to resemble something closer to a denial of service attack on the people responsible for security. And the impact they write has been truly devastating. The Internet bug bounty program paused all new submissions because AI has dramatically increased discovery volume beyond what their maintainers can handle. Node JS lost its bounty when funding disappeared.

Steve Gibson [00:53:27]:
The reports still come in, but the payouts are gone and curl removed financial rewards after being flooded with AI generated reports. Casey emphasized that this isn't a new problem, it's an old one, just massively accelerated. He said we're doing stupid things faster with more energy. Bug bounty, they write, has always had an issue with being a level playing field. One person submits a report and another person has to validate it. That sounds equal on paper, but in practice, if it has always been difficult for one person to keep up with validation, even before AI existed, now it's practically impossible. We're now in a world where anyone can generate dozens of reports, make them appear credible, and submit them instantly on the receiving end. However, the constraints have not changed.

Steve Gibson [00:54:25]:
It's still humans reviewing, triaging and making decisions. Open source has been the first to feel this impact. Open source is where the pressure has shown up first, largely because it was already operating close to its limits. Most projects are maintained by small teams, often volunteers with limited time and resources, yet they underpin massive portions of the web. Of course, we all think of that XKCD cartoon, right? With a little tiny block that's holding up this whole creaky infrastructure. They said add financial incentives, global participation, and now AI generated submissions and the system is quickly overwhelmed. The Internet bug Bounty program said it directly, quote, AI assisted discovery has shifted the balance between findings and remediation capability. Translation, we're finding more bugs than we're able to handle.

Steve Gibson [00:55:27]:
So now the bounty is gone and yet the expectation of reporting remains. But the question is, is the way bug bounty programs have been used to effectively scale security teams and improve security Posture still viable without financial incentives. Bug Crowd's founder Casey Ellis doesn't necessarily believe so. Every organization should have a vulnerability disclosure program because if you're on the Internet, people will find issues. But not every organization is in a position to run a public reward driven bounty program. In Casey's words, Curl likely should not have had one to begin with. Casey said, I don't think every organization should run a bounty program. The Curl program should not have been a bounty program in the first place, unquote.

Steve Gibson [00:56:23]:
And yet Daniel's experience shows something more nuanced. Daniel views the bounty program as a success because it incentivized real scrutiny of the code. He said, I've always thought about it as a success because it's a great way to actually encourage people to scrutinize the code. So what happens when you remove financial incentives? You'd assume that when you remove financial incentives you'd get rid of AI slop, but that you'd also reduce the likelihood of genuine vulnerabilities being disclosed. However, when Curl removed the financial incentives, something interesting happened. The low quality AI generated noise largely disappeared. Daniel said, quote, we have stopped getting AI slop security reports. Instead we get an ever increasing amount of really good security reports submitted in a never before seen frequency, which put us under serious load, unquote.

Steve Gibson [00:57:40]:
Okay, so I'm going to interrupt here to mention that I have a theory about why that is. Back when discovering vulnerabilities required long hours of painstaking, grueling work to step through and reverse engineer code, it was no fun. The only motivation, and it needed to be significant, was the promise of a big pot of gold payout at the end of that tunnel. AI driven vulnerability discovery has changed that. Today AI makes bugs both fun and easy to find. It allows less skilled users to participate, thus broadening the bug hunter base. And there are plenty of people who would sincerely like to give back and contribute. Until now they haven't been able to, but now they have the means.

Steve Gibson [00:58:42]:
They don't need a monetary incentive. They truly want to help. I. I think it makes sense. Aikido continues with their report writing. Instead of drowning in low quality reports, maintainers are now dealing with a high volume of genuinely useful findings, many of which are powered by AI assisted research. The barrier to entry has dropped. Not just for bad reports, but for good ones too.

Steve Gibson [00:59:13]:
But this creates a new kind of pressure. Even high quality reports take time to understand, to validate and to repair. And many of these good findings still fall into gray areas. Bugs that may not meet security Thresholds, but still require some attention. The result is a sustained and in some ways increased load on already constrained teams. So in a strange way, the system has not been relieved, it's been refined. And this is where it gets interesting, because while this is painful in the short term, it might actually be a step in the right direction. By removing financial incentives, we strip away a large portion of the noise.

Steve Gibson [01:00:00]:
What's left is a signal that is, on average, of higher quality, more intentional, and more aligned with actual security outcomes. AI is lowering the barrier for researchers to do meaningful work. It's enabling more people to find real issues faster than ever before. That combination, less noise, more signal, but still overwhelming volume, suggests we're in a transition phase. The historical model is breaking under the pressure, but what's emerging underneath it might be better. This would look like a system where disclosure is expected, not incentivized. Rewards are more targeted, not broad, and the focus shifts from more reports to better outcomes. We're not there yet.

Steve Gibson [01:00:55]:
Right now we're in the messy middle, where the old model no longer works and the new one hasn't fully formed yet. But if this plays out correctly, we don't end up with less bug bounty. We end up with a more sustainable version of it. What we're likely moving toward is a model where vulnerability disclosure becomes a baseline expectation across the industry, rather than something optional or incentivized. Public bounty programs don't go away, but they become more controlled, more targeted, and more aligned with organizational maturity. AI will inevitably play a larger role in filtering and triaging the growing incoming volume of reports. It won't solve the problem entirely, but it will become part of how we manage it. We'll also see a shift in what gets rewarded.

Steve Gibson [01:01:51]:
As automated systems become better at finding low level issues, the value of those findings will drop. Instead, incentives will move toward higher impact work, the kind that requires creativity, context, and a deeper understanding of the systems. That means researchers will increasingly focus on areas like chaining vulnerabilities, exploiting business logic, and breaking complex or emerging technologies where automation may continue to struggle. Okay, so think about this from the bounty provider standpoint. Taking curl as an example, Daniel terminates bug bounty payouts and observes an immediate drop in the total number of reports. But it's the bogus reports predominantly that disappear, not the useful reports that describe true problems. Given that, why would he ever resume bounty payouts? The Internet bug bounty is likely to observe the same thing. As I noted, what appears to be happening is that bugs are now so much easier to discover, even fun to Find and report that it's no longer necessary to dangle a carrot.

Steve Gibson [01:03:10]:
Actual human altruism, which, believe it or not, in 2026 still exists, is now sufficient to drive what once required the promise of payment. It'll take a while for this to percolate throughout the industry. But my prediction is now that the 31 years of bug bounty programs we've had ever since Netscape first offered payment for reports of bugs in Navigator 2.0 is probably going to wind down over time. And the reason our programs are currently overwhelmed by good bug reports is that unfortunately, they are very buggy. It's going to take a while. I mean, this is the, that, that, that, that new phase where AI is finding problems that were not, is truly finding problems that were not known to exist. Those will wash out of the system over the next six months or so, and then the volume of really good reports will, will necessarily drop because there won't be nearly as many bugs to be found in real time. And as AI then continues to check code before it goes out the door, we're not going to have new bugs introduced into the ecosystem.

Steve Gibson [01:04:31]:
I think it's really interesting that potentially we are talking about a major shift in the way bugs are discovered. It won't nearly be as much for money moving forward as it has been in the past. Leo.

Leo Laporte [01:04:48]:
Okay, you want to take a little break?

Steve Gibson [01:04:51]:
I do.

Leo Laporte [01:04:51]:
All right.

Steve Gibson [01:04:52]:
And then we're going to look at a new product from Anthropic which we might call Mini Mythos or Mythos Light or Mythos Junior or something. Yes. And it's available to, to all Claude Enterprise users now.

Leo Laporte [01:05:09]:
Okay. Oh, cool. You're watching Security Now, Mr. Steve Gibson. We do this show every Tuesday right after Mac break Weekly. That's about 1:30 Pacific, 4:30 Eastern, 20:30 UTC. And you can watch it live if you really want. The freshest version of it.

Leo Laporte [01:05:26]:
Our club members get to watch in the club, Twitch, Discord. But there's also, of course, tick not TikTok x.com, facebook, LinkedIn, Twitch, YouTube, and Kick. So pick your platform. Watch us live or get it after the fact on Steve's site GRC.com or our site Twitter TV SN. I thought that was really interesting that the first bug bounty was 31 years ago. That's, that's remarkable. That is really amazing.

Steve Gibson [01:05:54]:
Yeah, yeah, it's a, it's a program that has worked, but I, I, to me, it really makes sense if we have, I mean, finding bugs and contributing, you know, giving back. We know that there is A lot of altruism out there in the world.

Leo Laporte [01:06:09]:
Absolutely.

Steve Gibson [01:06:09]:
You know, people who would like to contribute, you know, but, and so, you know, you know, spending some time working with a security and AI enhanced vulnerability finding system, I think that makes just total sense.

Leo Laporte [01:06:25]:
Well, that's one thing I don't think Netscape could have anticipated 31 years ago that AI would suddenly be fighting all these flaws.

Steve Gibson [01:06:32]:
For the intervening 30 years it's been fabulously, fabulously successful.

Leo Laporte [01:06:37]:
It's worked really well.

Steve Gibson [01:06:38]:
You know, millions of dollars, millions and millions of dollars have been paid out to, you know, authentic bugs and vulnerabilities that have been found. So the systems have working now we have AI able to pick up that, that burden and carry it forward.

Leo Laporte [01:06:53]:
There's another category of people who are out of work, bug bounty finders.

Steve Gibson [01:06:59]:
Well, that's true. It's not a, probably not a career path. Although if you are expert in running AI discovery, then you've got a new way to make some money.

Leo Laporte [01:07:08]:
Well, actually that's a good point. That Linux copy fail flaw, they found it not with the AI solely, but because a very smart security researcher pointed the AI at a specific direction and said, hey, I wonder if this is a problem. And then the AI was able to go a little step further. So it was really a partnership.

Steve Gibson [01:07:27]:
Exactly, yeah. Okay, so we can add. Well, it's, it's, it's apropos of the changes being wrought to AI vulnerability discovery that we have Anthropic's announcement last, late, late last week of CLAUDE Security, which is now entering public beta for their enterprise customers. We could think of it as Mythos Jr. And that's sort of how they're casting it. Here's what Anthropic posted about this. They said Claude Security, which is what they're calling it, Claude Security is now available in public beta to CLAUDE enterprise customers. AI cybersecurity capabilities are advancing fast.

Steve Gibson [01:08:13]:
Today's models are already highly effective at finding flaws in software codes. The next generation will be more capable still and will be particularly effective at autonomously exploiting these flaws. Now is the time for organizations to act to improve their security, preparing for a world in which working software exploits are much easier to discover. Recently we made Claude Mythos Preview, which can match or surpass even elite human experts at both finding and exploiting software vulnerabilities. Available to a number of partners as part of project glasswing. But our cybersecurity efforts go beyond glasswing. With CLAUDE Security, a much wider set of organizations can put our most powerful generally available model Claude Opus 4.7 to work across their code bases. Opus 4.7 is among the strongest models available for finding and patching software vulnerabilities and for discovering complex context dependent issues that might otherwise be missed.

Steve Gibson [01:09:28]:
CLAUDE Security, previously known as CLAUDE Code security, has already been tested by hundreds of organizations of all sizes in limited research preview, helping teams scan their code bases for vulnerabilities and generate targeted patches. Their feedback has shaped today's release, which makes CLAUDE Security available to all enterprise customers. It comes with scheduled and targeted scans, easier integration into audit systems, and improved tracking of triaged findings. No API integration or custom agent build is required. If your organization uses Claude, you can start scanning today. Opus 4.7's capabilities are also being brought to cyber defenders through Claude's integration into software tools that many enterprises already use. Our technology partners, including CrowdStrike, Microsoft Security, Palo Alto Networks, Sentinel One, Trend AI and Wizard are embedding Opus 4.7 into their tools. In addition, services partners like Accenture, BCG, Deloitte, Infosys and PWC are now helping organizations deploy CLAUDE integrated security solutions.

Steve Gibson [01:10:49]:
We're entering a pivotal time for cybersecurity. AI is compressing the timeline between vulnerability, discovery and exploitation. We believe the right response is to make sure defenders have access to frontier capabilities in the ways most accessible to them. Through CLAUDE directly and through our partners, CLAUDE Security can be accessed directly from the CLAUDE AI sidebar or at CLAUDE AI Security. To begin, select one of your repositories or scope to a specific directory or branch, then start a scan. While scanning, CLAUDE reasons about code much like a security researcher. Rather than finding vulnerabilities by searching for known patterns, CLAUDE seeks to understand how components interact across files and modules, traces data flows, and reads the source code. Once complete, CLAUDE provides a detailed explanation of each of its findings, including its confidence that the vulnerability is real, how severe it is, its likely impact, and how it can be reproduced.

Steve Gibson [01:12:03]:
It also generates instructions for a targeted patch, which users can open in CLAUDE code on the web to work through the fix in context. It just sounds fantastic. Over the past two months, we've refined CLAUDE Security in line with what we learned from its use in production across hundreds of enterprises. Specifically, we've seen that detection quality is paramount. Teams have told us that high confidence findings are what really accelerate security work. CLAUDE Security's multi stage validation pipeline independently examines each finding before it reaches an analyst, which drives down false positives and CLAUDE attaches a confidence rating to every result. This means that the signal that reaches the team is worth acting on time from scan to fix is the metric that matters. Early users pointed to this consistently with several teams going from scan to applied patch in a single sitting, where instead of days of back and forth between security and engineering teams, teams want ongoing coverage, not one off audits.

Steve Gibson [01:13:24]:
We've added the option to schedule scans so teams can set a regular cadence around reviewing and acting on findings. With this release, we've also added the ability to target a scan at a particular directory within a repository, dismiss findings with documented reasons so that future reviewers can trust prior triage decisions, export findings as CSV or markdown for existing tracking and audit systems, and send scan results to Slack, Jira or other tools via webhooks. Okay, given the wind up we've seen from Mythos over the past month and the way they describe this, I cannot imagine why any organization whose software might contain external exploitable vulnerabilities or bugs would not be jumping on this with all possible speed. As I noted a few weeks back, an organization's own internal software is only closed source to the outside world. To the organization, their own source code is wide open. And there is now an emerging tool that stands a good chance of discovering bugs that have until now escaped notice. I would love to be a fly on the wall in the software development dungeons of the world's enterprises. You know, watching their reactions to what they begin seeing from this Claude security ba basically this is anybody is now able to purchase a mini version of Mythos and and I would argue that that if Mythos is even better that at finding bugs there's still benefit from from running this mythos Jr.

Steve Gibson [01:15:26]:
You know Claude Security over your code base to see if it's able to find something. Certainly if it can Mythos would Mythos may be available in the future? Well we we presume it will be at some point but you have this now so I I think this is you know, a maybe in retrospect a predictable evolution on Anthropic's part, but certainly

Leo Laporte [01:15:53]:
welcome I do this anyway. I mean I don't have Mythos or anything like it. I just have the regular, you know Claude Opus4.7 and chat GPT5.5 and I always say in fact I often have chat GBT check Claude's work and Claude check chat GPT's work.

Steve Gibson [01:16:09]:
Yep.

Leo Laporte [01:16:11]:
I frequently say let's do a security audit on these on these repositories. I mean that by itself is useful. I found all sorts of stuff. I've also had it done security audits on my systems and it's found errors and, and corrections there too. It's a, you know, just the regular models are useful. I can't wait to see how Mythos does. Yeah.

Steve Gibson [01:16:28]:
Yeah. And I, I think what, what from what they've said, what this adds is the ability for example, to, to schedule scans so that you're your, your, your engineering software development team, they're, they're just working along and then periodically the, the, the code base is given a, a scan and a check to see if any, anything significant has been found.

Leo Laporte [01:16:56]:
That's a great idea. I think that's. Yeah, that's brilliant.

Steve Gibson [01:16:59]:
Okay. So OpenAI announced that they've decided. I was very impressed by this. I'll just, I'll just say ahead of time to make account login security a selling point. Their posting was titled Introducing Advanced Account Security. And they explain today we're introducing Advanced Account Security, a new opt in setting for chat GPT accounts. And you've got it now. Leo Designed for people at increased risk of digital attacks as well as for those who want the strongest account protections available.

Steve Gibson [01:17:41]:
It brings together a set of heightened security measures that help safeguard against account takeover while making those protections easier to activate in one place. Once enrolled, Advanced Account Security protects users in codecs as well. They wrote people are turning to AI for deeply personal questions and increasingly high stakes work. Over time, a chat GPT account can hold sensitive personal and professional context and sit at the center of connected tools and workflows. For some people, like journalists, elected officials, political dissidents, researchers, and those who are especially security conscious, the stakes are even higher. This effort is part of our broader cybersecurity Action plan to broaden access to the technologies that can help protect communities, critical systems and our national security. We want users to have the controls to make the security and privacy choices that are right for them. At the same time, we want to ensure users understand.

Steve Gibson [01:18:54]:
Here's a critical part. Understand that the increased protection of advanced account security comes with an increased responsibility for account recovery. And so now they get specific. Advanced Account Security brings together a series of controls that strengthen sign in protections, tighten account recovery, reduce exposure from compromised sessions and give users more visibility into account activity. It's available to opt into in the security section of users ChatGPT accounts on the web. Protection applies to both ChatGPT and Codex accounts that are accessed through that login. So we have stronger sign in methods. Advanced Account Security requires pass keys or physical security keys while disabling password based login help helping make phishing resistant.

Steve Gibson [01:20:00]:
Sign in the default for people who need it most. So password based login gone. You must use a pass key or physical security key. Next, more secure account recovery. If a user's email account or phone number is compromised, an attacker may try to use one of them to gain access to their chat, GPT account via email or SMS based recovery. We know that, right? They say to reduce this risk, advanced account security disables email and SMS recovery and requires stronger recovery methods, backup pass keys, security keys and recovery keys. Because account recovery is restricted to these more secure methods, OpenAI support will not be able to assist with account recovery. For users enrolled in Advanced Account Security, again, with heightened, with truly heightened security comes much more responsibility.

Steve Gibson [01:21:12]:
You know, they're saying we can't help you because you don't want bad guys posing as you to get help from us either. So you know, now we're talking, you know, I hopefully this sort of much more responsible security becomes more commonplace. Now the only gotcha of course is that it makes users entirely responsible for the security they claim to want and to cherish. By explicitly removing email and SMS account recovery loops, the most common phishing and other attacks will be thwarted. You know, but you know, I could see in the case of chat GPT login, this makes sense. OpenAI explains two additional security enhancements writing shorter session management Sign in sessions are shortened to reduce the window of exposure if a device or active session is compromised. Users also receive alerts when there's a login to their account and they can review and manage the active sessions across the various devices they're signed into. And finally, automatic training exclusion.

Steve Gibson [01:22:28]:
People working with especially sensitive information may opt to not have those conversations used for model training. With advanced account security enabled. That preference is automatic conversations from those accounts will not be used to train our models. They finish saying using physical security keys such as Yubikeys is one of the strongest defenses against phishing. To make that level of protection easier to access, we have partnered with Yubico, a leader in hardware based authentication and account protection, to offer our users preferred pricing on a customized bundle of the best in class security keys. The Yubikey C Nano is designed to stay in your laptop. You know it, you stick it into a USB port and it's just, it's its head just basically tucks out a little bit so, so you're able to touch the, the, the little gold metal convex head of it in order to authenticate. And they said for low friction daily authentication and the Yubikey C NFC for backup and use across laptops and mobile devices, we're launching this partnership as part of Advanced Account Security, but the bundle will be available to all eligible users in their security settings on the web so more people can adopt stronger phishing resistant account protection.

Steve Gibson [01:24:10]:
Users will also be able to use other FIDO compliant security key or use software based pass keys. So I logged into Chat GPT which I I am no longer using as my daily driver. You know, I've switched to Claude after appreciating how confused an AI's context window would become if I were to share it with my wife Lori. So now we each have our own once I was there in ChatGPT. Sure enough, the security panel of the settings dialog now has many new features and I think this is great. I expect to see this sort of enhanced security become a standard feature to more rigorously, I mean like across the industry to more rigorously protect the potentially very highly sensitive dialogues that many people are having with their AI chatbots. You know, once you appreciate which Claude recently made explicitly clear that the entire history of your conversation is by default retained for use in creating a conversational context, the importance of more tightly controlling exact its access becomes I think, very clear. Okay Bill, before we get into our main topic, I did want to update everybody on something that I just discovered about Sync Thing and Sync Tracer.

Steve Gibson [01:25:43]:
Of course we've spoken often about Sync Thing. You know, both Leo and I and many of I of our listeners I know are huge fans. Sync Trezor T R S Y N C T R A Y Zor is a terrific little Windows GUI wrapper that turns syncthing into more of a Windows app in the words of its creator. He said Sync Tracer is a little tray utility for syncthing on Windows. It hosts and wraps syncthing, making it behave more like a native Windows application and less a command line utility with a web browser interface. Features include has a built in web browser so you don't need to fire up an external browser. Optionally starts on login so you don't need to set up syncthing as a service has Dropbox style file download and progress window. The tray icon indicates when synchronization is occurring.

Steve Gibson [01:26:45]:
Alerts you when you have file conflicts one of your folders is out of sync folders have finished syncing and Devices Connect and Disconnect has a tool to help you resolve file conflicts can pause devices on metered networks to stop Sync Thing transferring data, for example on a mobile connection or a WI FI hotspot, and contains translations for many languages. Anyway, I've been using both of these for years Sync Tracer, which contains syncthing, and I hope to continue doing so. As we mentioned, syncthing can also be installed into the Synology nas, and I've been using it there for many years, ever since my first Drobo died and I got a Synology to replace it. And at that point, as I said, I switched to Synology. Syncthing works perfectly there as well. I'm mentioning all of this since Sync thing on Windows 10 has been noting that version 2.0.16 has been available for some time, since I heard from several of our listeners that the major version 2 of syncthing is fully backward compatible with version 1.3, which was where version 1 left off and which is where I'm still stuck on on my Windows 7 machine because it won't run anything after version 1.3. I decided it was time, you know, to quiet down that new version available notice but when I updated syncthing, it complained about an unknown command line switch, meaning that the way syncthing was being launched by Sync Trezor, it wasn't familiar with the Pro. The trouble of course, was that the version of Sync Tracer I had was also out of date, so I updated it.

Steve Gibson [01:28:40]:
That's when I learned that Sync Tracers creator had abandoned his baby last August when he archived his GitHub project. At the time he wrote, I stopped using Sync Thing some years ago and I'm afraid I don't have the time to maintain it. Sorry, German coding has kindly forked it as sync tracer version 2 and is continuing development and this fork is recommended by syncthing. Please switch to sync tracer version 2 after determining that you trust the fork. So I first verified that the that the Sync Thing project does indeed still recommend the use of this forked sync tracer 2. And indeed they do. It is recommended among their contributed software. So I wanted to let everyone who's been happily using syncthing know that indeed major version cross compatibility works.

Steve Gibson [01:29:45]:
I've got syncthing 2 now in one location on Windows 10 and syncthing 1.3 on still on Windows 7 until I shut down this workstation and consolidate my locations, which I'll be doing in over the next couple months. I ran the new installer for for sync tracer 2. It saw that there was an older version available, offered to upgrade. It did that, everything went smoothly and everything is working now perfectly. So I just wanted to make a note for those people who have maybe Windows users using Sync Thing. If you don't know about Sync Tracer, it's a neat little wrapper and if you do, you are able to update and everything works great.

Leo Laporte [01:30:33]:
You don't have to use it though. I mean you can use Sync Thing directly, of course.

Steve Gibson [01:30:36]:
Absolutely. You're able to use Sync Thing and set it up as a Windows service and it just works by itself.

Leo Laporte [01:30:43]:
Let's take a time out before we get to the subject. The browser AI API. You know there was a story, I don't know if this is related, that came out earlier today that Chrome is automatically downloading a pretty, pretty hefty AI model and you can't stop it.

Steve Gibson [01:31:03]:
Not so Nano.

Leo Laporte [01:31:04]:
Not so nano. I don't know if that's related. Maybe it is.

Steve Gibson [01:31:07]:
It was, it was initially 22 gigs. I think they got it down to 4.7. I know, I know, I know.

Leo Laporte [01:31:17]:
Okay, you kind of have to have Chrome, unfortunately. For instance, I'm using Chrome right now because the Restream, which is what we use for this show, works best with Chrome. I'm a Firefox user, but I have to have a copy of Chrome and I have to have a 4 gigabyte copy of Nano along with it. Oh, well, actually back to our discussion of Chrome and AI on security now, Steve.

Steve Gibson [01:31:44]:
Yeah, so turns out, and this is actually exactly on point for this, this Nano LLM, Google is planning to define a new API to bring AI into our browsers. This was s. This would serve as an interface to large language models existing outside the browser or brought in by the browser. Google appears to be mostly targeted at local LLMs, but support for cloud based LLMs is present too. So this would be a means for allow. Just to make this clear, for allowing web pages or browser extensions to to invoke a user's local or remote large language models for many purposes, such as locally reading and summarizing a web page's content, proofreading a web page document being edited, or reading through someone's webmail to produce summaries or take actions. In other words, it would create a JavaScript API large language model prompting interface. Now, not everyone thinks this is a good idea and many of those not everyones includes end users who feel uncomfortable with this creeping trend toward AI everything.

Steve Gibson [01:33:20]:
An early instance an example of this which we covered at the time was Vivaldi Browsers CEO John von Tetchner who said we don't see AI as something that our users are asking for. Rather the opposite. I think a lot of people are reacting to Force fed AI. John cited as a no thanks example Microsoft's recall compiling a long term history of everyone's desktop screenshots every 5 seconds giving recall the label of AI now seems sort of quaint in today's world. We've come a long way in a short time. Tetchner said that quote, the future of browsers is about who controls the pathway to information and who gets to monetize you, unquote, which frames the race to insert AI into our browsers as a power grab more than as a feature competition. So the thing that put this on my radar last week was seeing that Vivaldi's John von Tetchner has some other company, notably Mozilla. In a posting to Blue sky Last Thursday, April 30, Mozilla's Jake Archibald wrote, chrome looks to set.

Steve Gibson [01:34:44]:
I'm sorry, Chrome looks set to ship an LLM prompt API to the web platform. At Mozilla, we oppose this API. We feel it has a large interoperability risk and Google imposing terms and conditions on a web API sets a dangerous precedent. Okay, now Leo, listen to this. Before I go any further, I want to touch on those terms and conditions, since that alone is a deal breaker for me. Last week in a thread in Mozilla's GitHub account, Jake wrote, according to Google, according to Chrome's documentation, to use the prompt API you must acknowledge Google's generative AI prohibited uses policy. Elements of this policy go beyond law. For example, do not engage in generating or distributing content that facilitates sexually explicit content.

Steve Gibson [01:35:54]:
Do not engage in misinformation, misrepresentation or misleading activities. This includes facilitating misleading claims related to governmental or democratic processes. So here we have a proposed web browser API that implicitly contains acceptable use policy. This would be like a web browser refusing to display controversial four letter words on the grounds that someone might be upset by what a website might wish to have their browser display. Hearing this causes me to want to select a couple of four letter words myself. This is so wrong.

Leo Laporte [01:36:41]:
Yeah. Now this is the system prompt though for the AI, right?

Steve Gibson [01:36:48]:
No, there is a system prompt for the AI which is part of the API. Yeah, but, but, but. So, so this is, this is saying that the use of the prompt API by JavaScript running in the browser must acknowledge these. This acceptable uses policy because it sounds

Leo Laporte [01:37:09]:
more like the kind of thing you tell an AI not to do. And that's.

Steve Gibson [01:37:12]:
No, no, this is for developers. This is for. Yes, for developers. So I just thank God we have respected developers at Mozilla to push back and I hope this also comes to the attention of the eff because this is seems wrong. Okay. So to obtain some pro and con balance here, let's first look more closely at what this new so called Prompt API that that's the name that they're giving it, the Prompt API that Google has already implemented and moved into Chrome. It's already in Chrome, which is why Leo, you noted that this multi gig download is happening because they're also downloading a model their nano, the so called Nano model. The explainer for this nascent feature says so this is now Google speaking.

Steve Gibson [01:38:05]:
This explainer and the and the accompanied draft report are in active development by the Web Machine Learning Community Group. Community group members are seeking feedback and they're getting some seeking feedback and support for this proposal to gain working group and implementer adoption. Implementations are experimentally available in Google Chrome and Microsoft Edge browsers and operating systems. They write are in order to set the context here, browsers and operating systems are increasingly expected to gain access to language models. Okay, I didn't know that, but okay. Language models are known for their versatility. With enough creative prompting they can help accomplish tasks as diverse as we have some bullet points classification tagging and keyword and keyword extraction of arbitrary text helping users compose text such as blog posts, reviews or or biographies summarizing, for example of articles, user reviews or chat logs generating titles or headlines from article contents, answering questions based on the unstructured contents of a web page, translation between languages and proofreading. In other words, all of the things I mean like AI in your browser, things that Vivaldi said.

Steve Gibson [01:39:36]:
I don't know if we want to jump into that just yet, they said. The Google Chrome, Microsoft Edge and the Web Machine Learning Community Group are exploring purpose built APIs for some of these use cases, namely translator, language detector, summarizer, writer, rewriter, and proofreader. This proposal additionally explores a general purpose prompt API that allows web developers to prompt a language model directly. This gives web developers access to many more capabilities at the cost of requiring them to do their own prompt engineering. Currently, web developers wishing to use language models must either call out to cloud APIs or bring their own and run them using technologies like WebAssembly or Web GPU, usually through JavaScript runtime frameworks. By providing web platform API access to the browser or operating system's existing language model, we can provide the following benefits compared to cloud APIs local processing of sensitive data, for example allowing websites to combine AI features with end to end encryption Potentially faster results since there's no server round trip involved offline usage lower API costs for web developers and allowing hybrid Approaches such as free users of a website to use on device AI, whereas paid users use a more powerful API based model. Okay, now I'll, I'll just interrupt here to note that those seemingly. I, I don't know those, to me they feel like made up reasons.

Steve Gibson [01:41:28]:
You know, local processing of sensitive data, for example, allowing websites to combine AI features with end to end encryption. I get the local processing angle that's potentially valid, but the end to end encryption part makes little sense to me in this context. We already have TLS connections with all websites and we have decades of history and experience with making TLS privacy and security bulletproof. Then there's potentially faster results since there's no server round trip involved. They cite. Okay, so the assumption here is that a local, potentially underpowered LLM is going to outperform an LLM in these monster data centers that are being frantically built today. All of everything I'm seeing says that the cloud blows away local LLM and so on. For the remaining three benefits.

Steve Gibson [01:42:27]:
You know, our browsers already do have the ability to query cloud based LLMs using the tried and true XML HTTP Request API, which has been around forever, or the more recent Fetch API. And both of those offer state of the art mature security and privacy protections. So what really appears to be going on here is for Google to be engineering a means for their Chrome and other chromium based browsers, notably Edge from Microsoft, to access non cloud based LLMs. Since everyone can already do that, that is can already access cloud based LLMs. Their explainer continues writing Compared to developers supplied model approaches using a built in language model can save the user's bandwidth, storage and memory resources while using a model that's optimized for the device. This pattern could also provide a lower barrier to entry for web developers by removing the need for developers to serve models and and manage their dependencies. Okay, now I'm not sure that that makes sense to me. Again, this presumes that any and all large language models are identical and interchangeable and that the the web developer doesn't care which one they're interacting with.

Steve Gibson [01:43:59]:
They're just using a generic LLM that the user has provided to their browser. You know, today that's already not the case. I mean it's already not the case that all LLMs are identical and interchangeable. And I expect model design and capability to diverge more as we move into the future rather than converge. Of course, we'll see how that goes. So next, Google's explainer clearly states its goals. Our goals are to provide web developers a uniform JavaScript API for accessing browser provided language models of varying capabilities Encapsulate model management and execution details as much as possible. For example, for downloads, updates, templating and parsing.

Steve Gibson [01:44:49]:
Guide web developers to gracefully handle failure cases. For example, no browser provided model being available, I guess by always having one develop formal implementation guidelines and definitions, for example Initial on device models and possible cloud services the following are explicit non goals they said we do not intend to force every browser to ship or expose a language model. In particular, not all devices will be capable of storing or running one. It would be comforting to implement this ap I'm sorry, it would be conforming it would be conforming to implement this API by always signaling that no language model is available. In other words, that's acceptable. It may also be viable to implement this API entirely by using cloud services instead of on device models. We do not intend to provide guarantees of language model quality, stability or interoperability between browsers. In particular, we cannot guarantee that the models exposed by these APIs are particularly good at any given use case.

Steve Gibson [01:46:06]:
These are left as quality of implementation issues similar to the shape detection API. The following are potential goals we're not yet certain of Allow web developers to know or control whether large language model interactions are done on device or by using cloud services. This would allow them to guarantee that any user data they feed into this API does not leave the device, which can be important for privacy purposes. Similarly, we might want to allow developers to request on device only language models in case a browser offers both varieties. Allow web developers to know some identifier for the language model in use separate from the browser version. This would allow them to allow list or block list specific models to maintain a desired level of quality or restrict certain use cases to a specific model. And finally, they said both of these potential goals could pose challenges to interoperability. So we want to investigate how more important such functionality I'm sorry, investigate more how important such functionality is to developers who fought to find the right trade off.

Steve Gibson [01:47:26]:
So in other words, we in the world are not yet necessarily ready for this or in need of this. So we're unsure how it should work exactly, but we're going to charge ahead because this will be better than nothing. No, essentially what this comes down to when you strip it away is Google. And as you started with this Leo, Google wants to add a 4 gigabyte. Actually it's 4.7 is the number I saw, down from 22 which it was earlier a a massive language model to Chrome so that Chrome will become AI enabled intrinsically, and that would allow Chrome hosted web pages to do lots of things they can't now. So, okay, today's web browsers are littered with yesterday's great ideas that, while they may have never achieved critical mass, must still be present and supported, since random websites scattered around the world still use them. As one example, it may not be fair to single out Flash, since it did have its day. There was a time when you could only do things with Flash that you wish you could do on the browser, but the but JavaScript and scripting in general had not caught up.

Steve Gibson [01:49:06]:
But boy, was Flash difficult to kill off, and in some places, even today, it won't die. As I look over the Prompt API implementation section, I can I can empathize with Mozilla's gut reaction, since this does seem sort of, well, both obvious but also forced and a bit unnatural. For example, this API defines a specific system prompt, as they call it. The specification says the language model can be configured with a special system prompt which gives it the context of for future interactions. The system prompt must be the first message, whether passed via the initial prompts option to the Create function or as the first message to the first prompt or append method calls. We then see three examples of these various semantic options that they just described. The first one shows where a a a constant variable session one is set to the the large language model dot create functions output where the initial prompt the the init the the initial prompts system prompt is prepend pretend to be an eloquent hamster and then we we have the we log to the console the output of that that large language model was just created being prompted what's your favorite food? So of course an eloquent hamster is going to respond to the question what's your favorite food? I guess that's what lettuce. I think that's what? I don't know.

Steve Gibson [01:51:06]:
I think that's what hamsters like anyway.

Leo Laporte [01:51:08]:
An eloquent hamster, which is a different matter entirely, right?

Steve Gibson [01:51:11]:
Might be lettuce with caviar. Yes. Anyway, my reaction to all of this is that web standards are too important to be created in any half baked fashion, and Mozilla apparently feels that it's too soon to do this Once a web standard exists, as we know we've seen this over and over, it is incredibly difficult to deprecate it since as we saw with Flash, someone somewhere will be using it. Browser bloat and the security implications of that are very real problems.

Leo Laporte [01:51:51]:
Google has Never held back though, right. In unilaterally declaring web standards. Yes. They say, well, you know, we're the dominant browser. We can do whatever we want. Want. And I understand Mozilla's reluctance to go along for the ride. And I think people are not going to be happy about 4.7 gigabytes being downloaded to their hard drive.

Steve Gibson [01:52:13]:
It's really going to change the, the whole complexion of Chrome.

Leo Laporte [01:52:16]:
Yeah. So it becomes massive. I can understand why Google may say, oh, well, maybe for spell checking or local grammar or something. You, you know, developers might find a use for this. But it is a little, I think, I think Mozilla is right. This is premature. There's no reason to be doing this now. No, there's no demand for this now, I don't think, is there?

Steve Gibson [01:52:38]:
No, it, no. And there, I mean, the. What, I guess what they're, they, they recognize that you can do this in the cloud now browser pages are able to reach back out to the cloud and talk to a large language model. That's going on already. They're saying, well, but we want, you know, we've got this cool technology. We've managed to squeeze a large language model down to 4.7 gig. We want it in the browser because we can. Because we own the browser.

Leo Laporte [01:53:09]:
Right, right. And we might imagine down the road some use.

Steve Gibson [01:53:13]:
Yes.

Leo Laporte [01:53:14]:
It's hard for me to imagine what that use is, but yeah, I agree,

Steve Gibson [01:53:17]:
that would make, that would justify this. So Google's working specification goes on and on and on, and it's all extremely specific to the application of today's LLMs. They are creating something as important at an industry wide, you know, as an industry wide specification for what could just be the moment we're in today. I mean, to me that's the problem is that none of this is gelled yet. I mean, it is still a moving target. So the idea of API ing it to create a web standard seems premature and misguided. Anyway, I've dropped the URL of Google's full specification into the show notes. It's at the top of page 20 for anyone to follow up who may be interested.

Steve Gibson [01:54:06]:
I want to now switch to Mozilla's response. I have the rather dry conversation thread in Mozilla's GitHub account. Under it, it's under their standards positions. So I've dropped that URL into the notes also. But since this podcast endeavors not only to inform but also to entertain our listeners rather than sharing Mozilla's dry recitation. Ah, yes, I want to Share the registers. Typically feisty and irreverent take on this controversy. Leo, let's take our final break.

Steve Gibson [01:54:44]:
We're going to look at the flip side. What's going on?

Leo Laporte [01:54:48]:
I can only imagine what the reg has to say about this. I'm trying to give Chrome the benefit of the doubt, but this is the problem. This is my problem and my problem with Google for a while now. They don't go to the IETF or W3C and say, here we want to do a standard. You know, let's get everybody involved.

Steve Gibson [01:55:05]:
It's already in there.

Leo Laporte [01:55:06]:
Yeah, they're so big, they're so dominant, there's something like 90% of the browser space that they could just do it and it becomes a de facto standard. So I'm with you. I'm not necessarily against the idea. And it sounds like in their spec they're saying, well, it doesn't have to be our model, it doesn't have to be Gemma, it could be something else. But I don't know if there's a demand for this and I know people are going to be very upset. I already see the upset over this giant download and you don't get a choice. You can't turn it off. Right.

Leo Laporte [01:55:39]:
It comes with Chrome now. And back to our conversation. Actually, Darren Okey, who is, of course, as you know, one of our most avid AI users in the club Twit Discord, says he thinks this may be the most important thing to happen to browsers since AI. He thinks it's, it's, it's really important. I'm not sure I agree. I mean, I could see there's some potential.

Steve Gibson [01:56:04]:
It's a huge change to our browser.

Leo Laporte [01:56:06]:
It is a big change. I guess that's the, that's. Nobody disagrees about that. And I think it's also the case that Google is forcing this instead of proposing it. And I don't like that either. I didn't like it when they forced HTTPs down.

Steve Gibson [01:56:20]:
Well, and you don't always get the right design when one person does it. That's why, you know, so much of what is done correctly is a collaboration. And, you know, Mozilla has, you know, even though Firefox is a diminishing percentage of the desktop space, Mozilla as a company has been at the forefront of, of the, all of the standards work for ever.

Leo Laporte [01:56:47]:
Yeah, we talked to the, the CEO of the Mozilla Foundation a few weeks ago on intelligent machines, and even then at the time, and this is before they'd added that little switch he said, we're going to be very, very judicious about AI in our browsers. And now they actually have a switch that says disable all AI features.

Steve Gibson [01:57:05]:
Right?

Leo Laporte [01:57:05]:
This is a switch. Most notably, Google is not offering in Chrome, you cannot disable this.

Steve Gibson [01:57:12]:
Okay, so I'm going to share the Register's typically feisty and irreverent take on this controversy. They also supply a great deal of additional useful background, and when we see that their headline is quote, Firefox Maker Torches Google for Building Prompt API into Browser well, you know it's going to be good, the Register wrote. Jake Archibald, Mozilla Web developer Relations lead, articulated the organization's concerns in a GitHub discussion of the API, which provides a standard way to send and receive prompts and responses from a local machine learning model. Archibald wrote, quote, we continue to oppose this API and feel it has severe negative consequences to the interoperability, update ability and neutrality of the web platform. Unquote the Register writes the prompt API as Google describes it, gives web pages the ability to directly prompt a browser provided language model specifically. And here it comes. It provides a way to send natural language instructions to Google's Gemini Nano model, which is small enough to be downloaded okay for local inference through Chrome. However, writes the Register, it's not small.

Steve Gibson [01:58:40]:
Google recommends having 22 gigabytes of space available, although the Nano v3 Nano model for desktop use is 4.27 gigabytes. Web developers already have a variety of ways to interact with AI models. They could use cloud service APIs to communicate with hosted models, or they can access local models through technologies like JavaScript, runtime frameworks, WebAssembly or WebGPU. Various vendors like OpenAI and Perplexity and have shipped browsers that embed access to remotely hosted AI models. Mozilla itself is testing an AI based smart window in Firefox and is developing tools for AI model scaffolding. The prompt API aims to make it easier to run local inference in a way that takes advantage of browser security mechanisms to produce faster response times, to allow offline usage, and to provide more cost effective ways to integrate AI services, for example, providing a free AI fallback if users lack a paid API key. Okay, so that's interesting. That suggests that Google wants us to register our LLM AI provider accounts with our browser so that random websites we visit will be able to submit their prompts to our AI account.

Steve Gibson [02:00:14]:
This brings to mind the famous rhetorical question, what could possibly go wrong? The Register continues Mozilla's concern, as articulated by Archibald has to do with what the prompt API means for the web, not to mention Google's justification for deployment. First, he worries that Google's own Nano model will become the default and that developers will standardize on it in an effort to make the non deterministic responses of an AI model more predictable. That tendency, he argues, will create pressure for Apple and Mozilla to license Nano for the sake of a common user experience. Perhaps more significantly, Archibald notes that using the prompt API requires agreeing to Google's Generative AI Prohibited Uses policy, which prohibits activities that are not necessarily illegal, like generating disturbing content. I'll just pause to say who determines what content is disturbing. There is nothing that attorneys love more than ambiguous language in contractual agreements. It's a built in full employment guarantee. The Register quotes Jake saying this seems like a bad direction for an API on the web platform and sets a worrying precedent for more APIs that have browser specific rules around their usage.

Steve Gibson [02:01:50]:
Amen to that anyway, the Register continues. Finally, Archibald argues that Google misrepresented demand for the API by cherry picking a few a few social media posts and calling that a groundswell of developer support. Jake posted, quote, the intent to ship on Blink dev states web developers as strongly positive, and links to the explainer for evidence. The evidence provided there does not seem to fit the claim, unquote. In an email Archibald wrote, Archibald told the Register that the question is whether the prompt API is good for the web, and Mozilla doesn't believe it is. Jake said, quote, the core problem is interoperability. Prompts are tightly coupled to models. Developers will inevitably tune to the quirks and policies of whatever model they're building against.

Steve Gibson [02:02:55]:
That's how you end up with model specific code paths, which is the browser compatibility problem all over again. The terms and conditions issue is part of that. If using a web API means accepting a specific vendor's content policy, especially one that goes beyond the law, you're not really building for an open platform anymore, unquote. And just just to pause, what he means is remember Those days where JavaScript had to determine which browser it was in and then would do this code for ie, that code for Firefox, this code for Safari, and that code for Chrome? Those were. No, those were not good days anyway, the Register says With regard to Google's exaggeration of developer enthusiasm, Archibald said there are definitely devs interested in AI capabilities, but Google failed to provide evidence of that. The signal is polarized, not strongly positive, but either way, developer demand alone does not meet the bar. The question is whether the API can work across implementations without tying the platform to one vendor's model. Google did not immediately respond to request for comment.

Steve Gibson [02:04:15]:
However, on Thursday, Rick Byers, the Google Chrome engineer responsible for shipping the prompt API, chimed into the GitHub discussion to acknowledge the concerns articulated by Archibald. To his credit, he wrote, quote, as one of the Blink API owner approvers approvers for shipping this in Chromium, I admit that I share the concerns here in Mozilla's standards position. Where I differ is in preferring paths that promote experimentation, learning from mistakes and competition to those which err on the side of stalling innovation out of fear of what might happen. Unquote, right? That's a perfectly articulated response to the more cautious we should wait a bit to see what happens stance. The Register concludes their piece by writing buyers asked the web community to help collect evidence of harm to advance the discussion, pointing to the debate over other controversial web technologies like encrypted media extensions, remember eme? He suggested the outcome has not been as desire as was predicted, but focusing on data so far has not done much for Google's cause. According to a report created in February that compares the performance of Chrome with Gemini Nano and edge with 54 mini instruct using the prompt API. These models do not provide very good results, the report says. Quote for generative tasks, composition, tag generation, etc.

Steve Gibson [02:06:06]:
24.29% edges and 15.17% of Chrome's responses failed to complete the task at all. This is in reference to a rubric that defines failure as a score of 2 or less on a scale of 1 to 5. For classification tasks, 29.58% of edges and 23.93% of Chrome's responses did not label or categorize input correctly, so it's often also wrong. They finish with the report's conclusions, noting in terms of groundedness and accuracy, Edge failed, which is to say hallucinated 17% of the time, while Chrome failed 6% of the time. Is that good for the web? You could ask Chrome, but you might not get a reliable answer. And that's how the Register signs off. So burn.

Leo Laporte [02:07:03]:
Burn.

Steve Gibson [02:07:05]:
So where does this leave us? I guess it leaves me more happy than ever that I've stuck with Mozilla. I look at what Chrome, at what Google now presents us on a page of search results and it becomes clear that we are the product. You know, I search for something specific and sponsored, you know, instead of what I ask for, I get sponsored interception advertisements that are promoted to the top of the page and are presented before the result that I'm seeking that I need to weigh down past a bunch of YouTube video links that I have zero interest in. Okay, now in fairness, Google's not alone in doing this. Apple has similarly succumbed in their app store. The thing I'm looking for is never first any longer. Even when I search for it by name and spell it correctly. What's first is what someone paid them to show me first in the hope that I wouldn't notice or wasn't sure what it was that I wanted.

Steve Gibson [02:08:10]:
And on the Google side, in return for tolerating a bunch of advertising, we do receive a ton of services at no charge. You know, I author these show notes every week in Google Docs for free. And you know the catch all junk email account I maintain over at Gmail is similarly valuable. All of that means a lot. So thank you Google. But all of that seems fundamentally different to me from intermixing the design and establishment of crucial web standards with a single company's commercial interests. Yes, Google has succeeded in leveraging their position as the winner of Internet search into the winner of the web browser wars. I get it.

Steve Gibson [02:08:57]:
As I use the Internet daily, I am more or less continually being offered the opportunity to improve my life in one way or another by switching to Chrome. I constantly need to decline. Most people have given up declining and they're perfectly happy using Chrome whether or not their lives are any better for it. And that's great. But tremendous responsibility burdens Google's dominance with Chrome. You know, they need somebody knowledgeable to push back and to question their actions if for no other reason than to help them make the best choices. So I'm very pleased that we have Mozilla watching and actively participating. Google may and likely will still plow ahead and force Mozilla to keep up or to be left behind while Mozilla and Apple and you know, either be, you know, keep up or get left behind and become irrelevant.

Steve Gibson [02:09:54]:
But everyone will likely get a better browser, whether that's Chrome, Edge, Safari, Brave, Vivaldi or Firefox, if this is a collaborative effort. And Leo, the, the thing that I think was most significant here is the observation that, that, that archibald made, that LLMs are inherently non deterministic. You know, every time you ask a question you get a different answer. And so we're putting, we're now talking about having the browser interface to one vendor's solution which has a random number generator in its heart.

Leo Laporte [02:10:41]:
Not a very good one either.

Steve Gibson [02:10:42]:
You know, it's got, it's Got some temperature. It's got some temperature setting.

Leo Laporte [02:10:47]:
Right.

Steve Gibson [02:10:47]:
And apparently it's. They had to sacrifice a lot of reliability in order to get the size

Leo Laporte [02:10:53]:
down to something heavily quantized.

Steve Gibson [02:10:55]:
Yeah, that was, that was tolerable. They wanted it to be 22 gigs. And people said, F off. I am not putting that in my, you know, is that, is that, is that mass storage? Is that ram? Where, where does that 22 gigs live?

Leo Laporte [02:11:10]:
Somewhere you don't want it to live, probably.

Steve Gibson [02:11:12]:
And so they've had to squeeze it down in order to make it acceptable. And in the process, it's lost its reliability. So. So, I mean, really, if, if we want to be able to surf the web with any browser we choose, and if web pages that we download are going to start wanting to use local large language models, whose large language model will it be? And they aren't interchangeable. We know they're not interchangeable.

Leo Laporte [02:11:43]:
Right. Well. And you know, Darren, who loves AI, said, well, I can imagine some uses. For instance, it's hard to write software that detects misspellings, but the AI could quickly detect a misspelling if somebody's entering it in and correct it. And so there is that convenience. But I also think that this is Google bigfooting the whole process. And I. It's, it's part of the insidification of Google.

Leo Laporte [02:12:08]:
They don't feel any responsibility to anything at this point except their stakeholders to make more money. And that's clearly, you know, this is about dominating the browser space and putting everybody else out of business. The other thing that worries me as an AI fan, and I know you're an AI fan too, the more we force AI down the throats of unwilling users, the more they're going to hate it. Google's found that out. Microsoft's found that out.

Steve Gibson [02:12:37]:
Annoying chat box in the lower right corner of your screen. Well, that's going to end up running locally. And it's like.

Leo Laporte [02:12:46]:
So I don't want to turn people against AI. AI is a real value, but by doing this, kind of forcing it down people's throats, you're actually making enemies. And I don't think that's good either for Google or for AI in general. So, yeah, I have lots of problems. We'll talk about this. I'm looking forward to a conversation tomorrow.

Steve Gibson [02:13:03]:
One thought would be unbundling the LLM from the browser that is creating an interface, but not having it, like, secret. I mean, it's essentially secret right now. I mean, I get it. That's the way to minimize friction so that everybody has it because Google wants everybody to have it.

Leo Laporte [02:13:27]:
But it's not a very well kept secret. I should point out that one of the reasons Google thinks this is okay is because they're already doing this on Android as is Apple doing it on, on iOS. There are built in local models on both those systems. Apple touts this all the time and you're data stays local on the device. Apple intelligence is a local model so there is a precedent for this on those platforms. I think I still wish, maybe it's a futile wish that the web would be a standards based interface and that everybody should be able to choose the browser of their, of their choice. And it should all, they should all work.

Steve Gibson [02:14:04]:
Well, the only one who doesn't want it to be a standard is the big guy.

Leo Laporte [02:14:08]:
Is Google the winner? Yeah, you wouldn't, you're not going to see Vivaldi saying well we think a standard should be favor us. They can't. Nor could Mozilla, but Google can. And yeah, clearly they, they do. I, I agree with you. I think this is a, you know we saw Google back way down on a number of its proposals.

Steve Gibson [02:14:29]:
True, the, the, the, the whole, the whole anti tracking technology. The whole, they had, they tried several times but they got real pushback. But they got pushback from people who had invested. I mean like advertisers. Yes, exactly. Large, large commercial interests and there's no one to push back on this.

Leo Laporte [02:14:52]:
Well just remember as users, maybe as individuals we don't have much power but collectively we do. They still need us to use their darn browser.

Steve Gibson [02:15:01]:
But would somebody leave Chrome to go to Firefox?

Leo Laporte [02:15:04]:
I don't know. Well, you and I have.

Steve Gibson [02:15:06]:
I, I.

Leo Laporte [02:15:07]:
Yes, you and I have and this is one of the reasons, and fortunately so far you can mostly use the Internet with a Firefox based browser. Mostly Wi Fi is another example. DRM in the browser.

Steve Gibson [02:15:22]:
Yeah, the, the open table site I use for restaurant reservations and it doesn't work under Firefox.

Leo Laporte [02:15:28]:
It's Chrome. As I said. Restream needs chrome because of WebRTC and the WebRTC implementation it uses. I think that's, you know, this is an object lesson. This is what happens. And if you don't want, if you want Chrome and Google to be the only player in the Internet, this is, this is how these things happen. I think we can fight. We gotta fight.

Leo Laporte [02:15:51]:
Hey, great, great topic. Great show as usual. Thanks to all of you for being here. We do security now. Tuesdays as I mentioned, Steve's got copies of his show. If you can't watch live at his website. GRC.com actually has a lot of good stuff@grc.com the show is there, including unique versions only. Steve has a 16 kilobit audio version, a 64 kilobit audio version.

Leo Laporte [02:16:15]:
Those are nice small versions for people who just want the audio. They don't want a lot of bandwidth. They don't want 4.7 gigabytes of AI downloaded with every single episode. He also has very nice transcripts written by Elaine Ferris. She's going to put that up a couple of days from now. It takes a while. She actually has to physically type it. He also has the show notes there.

Leo Laporte [02:16:35]:
20 pages, 21 pages this week, 22 pages of goodness. Now you can get those show notes ahead of time. He's been sending them out on Sunday lately. If you go to grc.com email you put in your email address there. It has two benefits. One, you're now whitelisted. He will validate that you're not a spammer that allows you to comment, send him questions, submit photos. Oh, there goes another one of those helicopters.

Leo Laporte [02:17:02]:
My wife might even be on it. Send in your photos for the picture of the week, that kind of thing. But below that email form there is also there are two checkboxes. One for the weekly newsletter mailing. You can sign up for that. You'll get it automatically every Sunday or Monday. The other is for a much less frequent email when he's got a new product. Something like Spin, right.

Leo Laporte [02:17:25]:
I don't know. Seven could be in the horizon. We're at 6.1 in the world's best mass storage maintenance, recovery and performance enhancing utility. He also has that fabulous DNS Benchmark Pro which he has been updating and a new update I think is coming soon. Anyway, that's how you'd find out about those things do get spin, right? That's Steve's bread and butter. You'll find that at GRC too. And if you have mass storage, you need Spin, right? If you don't have it, get it now for sure. Also lots of other free stuff.

Leo Laporte [02:17:55]:
Steve's kind of prolific. All hand coded in assembly language. Steve, I don't think you're ever going to use Vibe coding tools.

Steve Gibson [02:18:03]:
Somehow, you know, I'm, I think my first exposure may be creating some, some homegrown iOS things.

Leo Laporte [02:18:11]:
Ah, just for yourself.

Steve Gibson [02:18:14]:
Not something. Yes, it's, it's for home automation and just for like Mon. Mon. Monitoring GRC servers. And I, I'm, I'm thinking you know, not commercial products, but just my own, my own purpose.

Leo Laporte [02:18:26]:
I think it looking at my GitHub repo and my projects, I have 22 or 23 little things like that that I vibe coded that are. That are incredibly useful. You know, it's scanning my email now, it's preparing my calendar. It's doing all sorts of great stuff. But there is a big difference between putting that on your own hardware and using it for yourself and giving it to the public. And Steve knows that's a high, much higher calling, higher responsibility. We have copies of the show at our website, Twitter TV SN. We have 128 kilobit audio which does not, amazingly enough, sound any better than the 64 kilobit audio.

Leo Laporte [02:19:04]:
But it's there because Apple down samples and we need it to be bigger, etc. It's a long story. I don't even want to bore you with it. We also have video, which Steve refuses to do because he fought us every step of the way. But we've been offering video for some time now on Security now. You can get that@TWIT TV SN. There is a YouTube channel for the video. More importantly, you can subscribe in your favorite podcast client, get it automatic so you don't even have to think about it.

Leo Laporte [02:19:31]:
You just. Every Tuesday you'll get a new Security now, like magic. We will be back next Tuesday. I will be back home. I'm sad to say. I apologize for any stray noises coming in from. From my lanai, but it's been very

Steve Gibson [02:19:47]:
nice to have a little tropical.

Leo Laporte [02:19:49]:
Yeah. BIRD TWEETING BACKGROUND it's in the 80s. The breezes are blowing. It's just beautiful. It's really, it's really lovely here. Thanks, Steve. Have a great week. We'll see you next time on Security Now.

Steve Gibson [02:20:01]:
Righto.

All Transcripts posts