Hacker Newsnew | past | comments | ask | show | jobs | submit | mlinksva's commentslogin

Do you have a pointer to where LeCun spoke about it? I noticed last October that Dwarkesh mentioned the idea off handedly on his podcast (prompting me to write up https://manifold.markets/MikeLinksvayer/llm-trained-on-data-...) but I wonder if this idea has been around for much longer, or is just so obvious that lots of people are independently coming up with it (parent to this comment being yet another)?

Good title!



I've had approximately the same thought, to different but complementary ends "More generally (not covered in this question) perhaps this could also be a fun way to interrogate the tech tree, e.g., what could have been discovered given the data at a given cutoff, how early or late certain advancements came, etc." https://manifold.markets/MikeLinksvayer/llm-trained-on-data-...

Would love to see it!


Lots of discussion on the EFF's post on this same topic last week https://news.ycombinator.com/item?id=45985890

I expect a deluge of critical comments near the Dec 2 deadline. Add yours! :)



It's a very good thing the US has declined to sign this. The digital rights community has been campaigning against it since its proposal by Russia in 2017. The US not signing it is a small victory across a very large loss. Many explainers like https://www.eff.org/deeplinks/2025/10/joint-statement-un-cyb...


There doesn't seem to be much info about OMA available online. Your thesis linked from https://www.bristol.ac.uk/research/groups/trustworthy-system... which is linked from your home page/timeline is a broken link. Perhaps https://dl.acm.org/doi/fullHtml/10.1145/3450147 is the best in depth info available currently? Looking forward to future developments and success!


Oh dear, I hadn't realised Bristol Uni had broken the link. That paper has some information, as well as my UG thesis: https://ia600408.us.archive.org/22/items/archive_IHGC/Thesis...

Yeah the current closed nature of OMA means there's limited information at present. I am working on publishing more over the next year. It is essential the wider community starts to get access to at least the modified RISC-V ISA, to independently validate the security claims.


Great to see in the priorities "sandboxing by default" (under desktop variety) and https://nlnet.nl/project/Capability-based-RedoxOS/ (under security).


As the post mentions wallets like MetaMask being the targets, AFAIK MetaMask in particular might be one of the best protected (isolated) applications from this kind of attack due to their use of LavaMoat https://x.com/MetaMask/status/1965147403713196304 -- though I'd love to read a detailed analysis of whether they actually are protected. No affiliation with MetaMask, just curious about effectiveness of seemingly little adopted measures (relative to scariness of attacks).

Added: story dedicated to this topic more or less https://news.ycombinator.com/item?id=45179889


all that is inside the extension. meaningless if the extension got the changed address.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: