Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Your Passwords Are Probably Screwed
The New York Times ^ | April 28, 2026, 5:02 a.m. ET | Brett J. Goldstein

Posted on 04/29/2026 1:40:16 AM PDT by E. Pluribus Unum

Mr. Goldstein is a professor at Vanderbilt University who specializes in cybersecurity and artificial intelligence

Anthropic recently sent a shock wave through the cybersecurity world when it said its new artificial intelligence model, Claude Mythos, had exhibited an extraordinary ability to find previously unknown vulnerabilities in software — a hacker’s fantasy. Concern over the tool’s power caused Anthropic to restrict its release mainly to bigger companies, allowing them time to secure their software.

What is everyone else supposed to do? Smaller companies, organizations, nonprofits and regular people are just as much at risk as larger companies. But they most likely lack the skills and resources to address these challenges before their systems are compromised.

Many people may think these problems belong only to the world of cybersecurity experts or tech people, but that’s no longer true. New A.I. tools are going to increase how much insecure software you use in your day-to-day life, while giving attackers a new, powerful weapon to exploit vulnerabilities. If you’re still being careless about things like the strength of the passwords you choose, you’re in for a pretty bad time. If there was ever a time to finally take your cybersecurity practices seriously, it’s now.

I often give talks on cyberdefense to small groups. Inevitably, the conversation turns to personal concerns. Is this app OK? What should I do to protect my phone? Typically, I find a vulnerability for each person. One hasn’t installed bug fixes or security updates on their phone; another doesn’t use two-factor authentication on critical applications. Many have a dangerous app on their device. When confronted with the reality that they are at risk of attack, most insist that enjoyment and convenience outweigh the potential downsides.

That’s always been a dangerous miscalculation, but it’s worse now. We need to correct our behavior...

(Excerpt) Read more at nytimes.com ...


TOPICS: Computers/Internet
KEYWORDS: ai; anthropic; brettjgoldstein; claude; mythos; newyorkslimes; newyorktimes; password; vanderbiltu
Message from Jim Robinson:

Dear FRiends,

We need your continuing support to keep FR funded. Your donations are our sole source of funding. No sugar daddies, no advertisers, no paid memberships, no commercial sales, no gimmicks, no tax subsidies. No spam, no pop-ups, no ad trackers.

If you enjoy using FR and agree it's a worthwhile endeavor, please consider making a contribution today:

Click here: to donate by Credit Card

Or here: to donate by PayPal

Or by mail to: Free Republic, LLC - PO Box 9771 - Fresno, CA 93794

Thank you very much and God bless you,

Jim


1 posted on 04/29/2026 1:40:16 AM PDT by E. Pluribus Unum
[ Post Reply | Private Reply | View Replies]

To: sauropod

.


2 posted on 04/29/2026 4:17:16 AM PDT by sauropod
[ Post Reply | Private Reply | To 1 | View Replies]

To: E. Pluribus Unum

Free AI marketing and hype brought to you by the The New York Times.


3 posted on 04/29/2026 4:48:59 AM PDT by jroehl (And how we burned in the camps later - Aleksandr Solzhenitsyn - The Gulag Archipelago)
[ Post Reply | Private Reply | To 1 | View Replies]

To: E. Pluribus Unum
Passwords are like toothbrushes. Don't let any one else use it and change it every six months.

These days, it should be changed each month, 30 characters long and stored in a password manager.

4 posted on 04/29/2026 4:49:01 AM PDT by Bloody Sam Roberts (Perfection is impossible. But if you pursue perfection you may achieve excellence - - Vince Lombardi)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Bloody Sam Roberts

If I were nefarious and had access to Claude, I would sic it on Password Manager software.


5 posted on 04/29/2026 5:15:52 AM PDT by Uncle Miltie (Paid leftist Trolls ought to be banned here. There are several obvious ones.)
[ Post Reply | Private Reply | To 4 | View Replies]

To: Uncle Miltie

The one I use is on my phone. A password to get in, yes...but a fingerprint to unmask each password.


6 posted on 04/29/2026 5:19:12 AM PDT by Bloody Sam Roberts (Perfection is impossible. But if you pursue perfection you may achieve excellence - - Vince Lombardi)
[ Post Reply | Private Reply | To 5 | View Replies]

To: E. Pluribus Unum

Something weird that’s going on these days is the two factor authentication. I have do it for relatively minor accounts (is someone going to hack my account and pay my power bill or order new prescriptions?) but not for shopping sites, bank account, credit cards, etc.


7 posted on 04/29/2026 6:21:25 AM PDT by suthener ( I do not like living under our homosexual, ghetto, feminist government.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: E. Pluribus Unum

If it can be programmed, it can be hacked. If you don’t want to lose your info, your money, you identity, stay waaaaaayyyy off the internet for as long as you can. It’s been obvious for some time why governments want all personal info on the internet, so it can be altered and stolen.


8 posted on 04/29/2026 6:26:57 AM PDT by The Louiswu (USA FIRST...USA FOREVER)
[ Post Reply | Private Reply | To 1 | View Replies]

To: E. Pluribus Unum

Wrong. Wrong. Wrong. My passwords are NOT “probably “ and “screwed”. Where do they get these nuts?


9 posted on 04/29/2026 6:35:38 AM PDT by BipolarBob (Call my personal secretary, Jennie, at 867-5309.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: jroehl
Free AI marketing and hype brought to you by the The New York Times.

Glasswing is not hype.
10 posted on 04/29/2026 6:43:54 AM PDT by TexasGunLover
[ Post Reply | Private Reply | To 3 | View Replies]

To: E. Pluribus Unum

I posted the following on another thread, but it bears repeating:

While I am sure there are vulnerabilities, not all vulnerabilities are easily exploited. They may require certain uncommon settings to be set, or certain online behavior. Besides that, not every vulnerability leads to the same payoff. A vulnerability that causes a browser to crash at will, for instance, is not as serious as one that compromises the password manager.


11 posted on 04/29/2026 6:51:25 AM PDT by Dr. Sivana ("Whatsoever he shall say to you, do ye." (John 2:5))
[ Post Reply | Private Reply | To 1 | View Replies]

To: E. Pluribus Unum
1...2...3...4...5...

There is no substitute.™

12 posted on 04/29/2026 6:55:25 AM PDT by Frank Drebin (And don't ever let me catch you guys in America!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: jroehl
You can try to ignore AI for as long as you can but it's here and you're going to have to live with everything it can do.

So...good luck with that.

13 posted on 04/29/2026 7:01:38 AM PDT by yesthatjallen
[ Post Reply | Private Reply | To 3 | View Replies]

To: E. Pluribus Unum

The ‘bigger companies’ are the biggest crooks, especially on Wall Street.


14 posted on 04/29/2026 7:21:16 AM PDT by oil_dude
[ Post Reply | Private Reply | To 1 | View Replies]

To: E. Pluribus Unum

This article is an argument for bitcoin stored in a wallet offline


15 posted on 04/29/2026 7:22:31 AM PDT by oil_dude
[ Post Reply | Private Reply | To 1 | View Replies]

To: E. Pluribus Unum

“...Your Passwords Are Probably Screwed...”
-
I use:
Screwed#9


16 posted on 04/29/2026 7:52:59 AM PDT by Repeal The 17th ( I am obsessed with not being obsessed with anything.)
[ Post Reply | Private Reply | To 1 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson