Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

it literally just needs to throw a few kilobytes on literally any internet connected device, so that it can eventually get to a computer with a single good GPU, from which it can then start planning and executing its way to infect its way into datacenters and run using some percentage of its resources while staying undetected

it can also just threaten/blackmail/bribe a single human to try to carry this out on its behalf, and possibly even a human that manages these big data centers



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: