Microsoft's Edge Password Blunder
Loading summary
A
It's time for security now. Steve Gibson is here. A little change in Microsoft land over that edge password thing. We will talk about a new way of making chips work without electricity by pulling in quantum power from the air. Is that possible? And OpenAI and Microsoft's response to the anthropic Mythos security tool. All that and a whole lot more coming up next on Security now this episode is brought to you by Outsystems, a leading agency systems platform built for the enterprise. Organizations all over the world are building, orchestrating and governing agentic systems on the Outsystems platform and with good reason. Architect deliver and scale governed agentic systems with agility and trust using one open and unified platform Power secure company wide agentic orchestration for core business operations. Teams of any size and technical depth can use out systems to build, deploy and manage AI apps and agents quickly and cost effectively without compromising reliability and security. With Outsystems you can rapidly launch ideas from concept to completion. It's the leading agentix systems platform that's unified, agile and enterprise proven allowing you to accelerate growth, reduce operational friction and deliver real Enterprise impact with AI OutSystems build your agentic future. Learn more at outsystems.com TWiT that's outsystems.com SL TWiT podcasts you love from people you trust. This is Twit. This is Security now with Steve Gibson. Episode 1079 recorded Tuesday May 19, 2026 Daybreak and codename EM Dash it's time for Security now. Yay. The show we cover the latest security privacy computer sci fi everything on this man's mind. Mr. Steve Gibson is here. Hello Steve.
B
You know Leah, we were just using the expression has a mind of its own and I realized we really can't say that any longer without meaning it because things do or very will very soon will actually have a mind of their own. Yeah, yeah.
A
I mean like your car. Yeah, yeah, exactly. That's a really interesting. You know this is one of the big debates that's going on. Is. Is. Is is AI conscious and in fact it's one of the first questions I asked you when we started talking about AI on this show is where you stood on that. And you correct me if I'm wrong, but I think your position is the same as mine which is there isn't anything special going on inside our brain that couldn't be duplicated by a physical process outside of our brain. It may not be yet, but yes.
B
What I've. What I. I was just. I was talking to somebody who's not a techie yesterday and I said that who was interested in the topic and, and the way I framed it, I think it was, I know it worked for him. I said AI is language and language is knowledge but not understanding. And when he kind of looked at me, I said, think about a book. A book is language printed on paper. So, so obviously a book contains knowledge. Now you know, a book is, has knowledge which no understanding. Right, but exactly no understanding.
A
Right.
B
And I said in, in my. Because I'm, you know, I've been in computing my entire life, so when I'm interacting with, in this case Claude, I'm very, I'm still like stunned by. In fact, in fact I haven't. I have a little bri. A little one pager editorial about my feelings in after the last week of the danger that we are in. Not the kind of, well, maybe some people are worrying about it, but how seductive and addictive it is. It is inherently that it is. And if we thought social media was a problem, baby, you ain't seen nothing. So, but, but anyway, so I said, you know, in watching AI, I can see when I see its mistakes, I realize that it reveals, it doesn't understand what it's producing. It's producing astonishing content, but it doesn't understand it. And, and so that, that will. When that changes. And I agree with you, Leo. I don't see any reason why it can't. I don't know when or how or what. But you know, and, and this, the whole LLM era may just be, you know, the beginning of this. Lord knows, you know, anybody, cancer researchers, fusion researchers, quantum computing researchers, all they all say just give us money and we can make it. We can make it happen. Yeah, well, we've never seen anybody give anything money more than AI. I mean this is just ridiculous. So if there's an answer and if money can find, I mean if there's an answer and if money can find it, then we're going to have an answer. I mean we're going to see this thing continue to go. Yeah, because, and, and I have to agree, you know, if you, I think you were referring to it, that last scene toward the end of the Wall E movie, I haven't seen it for a long time, but it was a bunch of, you know, over like obese adults floating on a starliner. Like they were so fat that their bones were like being pulled apart or something. I don't quite remember what the was but you know, and the Matrix, right? Everybody in A pod who doesn't know that they're not just batteries. Yeah. And so imagine if. Well anyway, we may be headed there
A
is what you're implying.
B
We're some something is this is a problem for us. Anyway, so not surprisingly, today's topic is Daybreak and code name M Dash.
A
Oh boy.
B
Oh, yep, there it is.
A
There they are floating down the.
B
Oh goodness. Yeah, just.
A
Yeah, it was a wonderful movie actually.
B
Yeah, it is good. So Daybreak and code name M Dash, which are, you know, the, the responses to Mythos in various ways. Also we're going to talk about how we'll get to that at the end. But first Microsoft has decided to rethink Edge's so called intended behavior after it got some press.
A
We didn't intend that intended behavior.
B
Not favorable after all. Yes. Speaking of Microsoft, the chaotic Eclipse hacker has struck again with a bypass of bitlocker which some people have called a backdoor. I think that's taking it too far. Also, Google's Threat Analysis Group documents their discovery of the clear malicious use of AI, which we're beginning to see. Apparently Canada has not learned the lessons of the EU and the uk so their parliament is going to go down that same rabbit hole of, you know, you know, legal disclosure and, and tapping and so forth. We'll talk about that. I want to take, as I said, a moment to talk about how AI chatbots may be far more addictive than social media and why I think that is probably going to happen. Also, a comment about our a favorite piece of sci fi of ours project Hail Mary, now being available to stream. Also, I put this out there just because it was fun and it is so wacky and interesting. An apparently serious zero point quantum vacuum energy source. And every so often I hit a nerve among our listeners. And boy, you know, thanks to the fact that these notes went out early on Sunday, there's been lot of, a lot of time for some feedback from our listeners. So we're going to have fun with that and actually share some feedback and then talk and take a look at OpenAI's and Microsoft's vulnerability discovery systems.
A
Oh good. Oh good. Yeah, I mean it was pretty clear we talked about this a couple of weeks ago that Mythos is very effective. There was just a story last week about discovering a flaw in Mac OS which is pretty darn locked down getting around Gatekeeper. So you know, there's definitely some stuff. Oh and by the way Steve, there is a picture of our future here in the club Twit Discord. I'll pull this up for you and you can see it. I think this looks good. I think this is maybe our retirement plan or something like that.
B
I don't know.
A
I'm just saying. Oops. Squish you down. So there's room for us in our hover chairs. That's a podcaster's dream right there, let me tell you. But I need that smoothly. Get, get on that right away.
B
And I'm sure you've noticed there's been a complete revolution in this sort of thing. Like ads now look different.
A
Oh yeah.
B
You know, like late night comedy sketches are now using an entirely different imagery because it's now you need to have a huge staff of artists in order to create something that looks different.
A
Darren, what did you use? Because this is this nano banana. Because this is really looks really good, I have to say. Oh, he says chatgpt. Interesting. They're all doing it now. Google's doing it now too, with, you know, they're doing agents. I mean, it's amazing. Anyway, let's take our first break, just get this out of the way so we can get to the picture, the much long awaited picture of the week in just a little bit. I haven't seen it. I closed my eyes. But we'll see it together in just a little bit. But first, a word from our sponsor, Hawks Hunt. If you're a security leader, you have been there. The eye rolls during training, those terrible one size fits all phishing simulations that your employees spot from a mile away. And the report button, put that in air quotes. It gets ignored more often than not. Your programs, your training's running, but it's not changing employee behavior. Meanwhile, AI. Oh, AI is making real attacks more convincing by the day. And maybe your boss is starting to say, ask that question you may not have an answer to. Is this training actually working that we're paying all this money for? Well, good news. Hawks Hunt is here to answer that. Hawks Hunt empowers your empowers. That's a very important word. Not browbeats. Empowers your employees to spot and stop advanced phishing attacks, driving measurable behavior change through personalized gamified micro training. It's powered by AI and backed by behavioral science. And you'll like it because as an administrator, a Hawks Hunt does all the heavy lifting. Makes your life a lot easier. Simulations run automatically. Not just email, but Slack and teams too. They're personalized to each employee based on role, location and behavior, just like many of these phishing emails. And every simulation uses AI to mirror real world attacks, meaning employees are being tested on stuff that's actually getting through, not some outdated template. They immediately go, I recognize that gamified training makes it fun, keeps engagement high without feeling punitive. And because every interaction generates a coaching moment, you're not just tracking completion. No, my friend, you're building behavioral indicators that tell a real story. Reporting rates, repeat clicker reduction, and time to report. The kind of, you know, metrics that hold up when leadership comes into the office and starts asking the, the tough questions. And that's what's so great, I think, about Hoxhunt, is you're really getting training that works. But you don't have to take my word for it. With over 3,500 verified reviews on G2, Hoxhunt is the top rated security training platform recognized on G2 for best results, easiest to use, also recognized as customer's choice by Gartner. And it's used by thousands of companies, including the biggest, like the best, like Qualcomm, Docusign, Nokia. They trust it to train millions of employees worldwide. Visit hoxhunt.comsecurity now today to learn why modern secure companies are making the switch to Hawkshunt. That's Hawkshunt.com SecurityNow we thank them so much for their support of Security now. And we encourage you to support us by going to hawkshunt.com securitynow let them know you you saw it here. Picture of the week time, Steve so,
B
in keeping with today's podcast theme, I gave this picture the caption, worries over AI surpassing us may be overblown because AI has been trained on human output.
A
Oh, let's scroll up here. Oh, this is wrong. In so many levels. So many levels.
B
So, so this. I can't explain this, but then again, that's pretty fun. If, if AI is trained on us, then I don't think we have anything to worry about. We. We see the right side of a gate, which is open at the moment. The sign very clearly states, please close the gate to keep the seagulls out. Now, you know, last I checked, seagulls could fly. If it said the chickens, he had to keep the chickens out, then. Okay, you know, a flightless bird, that would make sense here. It's not clear how having a gate closed would affect seagulls one way or the other. I mean, unless they're. I like to walk anyway. Yes. I don't know what's going on here, Leo, but if AI is at our level being trained on our output, then I think we're going to be fine. For a while.
A
Not to mention the fact that the gate doesn't go all the way across the gap either.
B
I don't know what the hell.
A
The whole thing is just screwy. That's really funny. I love it.
B
All right, so last week we noted the discovery, the reporting and the widespread confirmation among some of our own listeners that Microsoft's Edge browser, remember, was storing all of its users passwords in RAM in plain text decrypted just sitting there where they were easily discoverable and exfiltratable en masse. The Data included the URLs so you knew where to go, the usernames and passwords so you knew what to put in once you got there, which were required to log into every website whose data was present in Edges password list and presumably where no other authentication factor would be required. Now this brings me to something we've talked about before. I'll just, you know, take a little segue here to pause and note that this is a perfect example that is Edge doing this, having this heinous behavior. A perfect example of the reason why if one is going to go to the trouble of having additional factors of authentication security, it's nuts to store that additional authentication information with the same single provider as the other as your other authentication information is stored. Our listeners have asked, you know, several times whether it's safe to store their one time password secrets in the same password manager as their usernames and passwords. You know, this comes down to the meaning of the word safe. You know, they want me to say yes because it's so convenient to extend a password manager's capabilities to include responding to the query for a 6 digit 1 time password token. I really do get it, and I understand the temptation here. So I'll just say that I've never done that and I never would. The entire point here is separation and redundancy, which is completely lost when all of the eggs are stored in a single proverbial basket. You know, I use, as I've said, OTP auth nice little iPhone app, iOS app on my iPad, on my separate iPhone. The good news is that most sites have become much smarter about avoiding needless prompting for one time password tokens. Whereas, you know, a financial institution or the government might reasonably insist upon the provision of a one time password every single time you log in. Or maybe if you haven't touched the the site for even 30 minutes or so. You know, many other less sensitive sites that have been configured to require a one time password will nevertheless relax their need when the browser being used already carries a previously valid login cookie which indicates that the browser was that browser was previously logged into that site. You know, this is the newer we recognize you on this computer messaging that we're seeing more and more often now. And that's good, right? Since we want bad guys who will not have that browser cookie to be forced to come up with that additional authentication factor, whereas we don't want it to be overly burdensome for regular users who want that added safety without the overboard hassle. Anyway, my point is, here's an example. You know, if one time password secrets were also exposed by Edge, as presumably they would be if Edge were to support that, then it would have been the keys to the kingdom. If, however, somebody had kept their one time passwords anywhere else, then they would have still had protection for all the sites that they cared enough about to establish a one time password. So, you know, and again, if you really don't want the security, go ahead, store them all in one place and you get the convenience of a password manager that does all that for you. But not me. Okay, so getting back to Microsoft and Edge last week we noted that Microsoft's disappointing but predictable response to to questioning about their in the clear storage of the user's authentication data was that it was intended behavior. Yes, that's what we intended. We intended it to be all out there in RAM so anybody could get it. The sans, remember the SANS Security Institute wrote Microsoft classifies this as intended behavior and the guy writing for Sans said, I'm not sure what what manager or lawyer decided that. Hopefully it wasn't anyone in their security team. Amen. Since I I titled this first bit of news intended behavior only until it gets media attention. You can guess what comes next, right? Bleeping Computer provides the details in the background Writing last Friday, Microsoft is updating the Edge web browser to ensure it no longer loads saved passwords into process memory in clear text at startup after previously stating it was by design. This behavior was disclosed on May 4 by a security researcher, Tom Running, who demonstrated that all credentials stored in the Edge built in password manager were decrypted on launch and kept in memory and even when not being used. Ronning also released a proof of concept tool that would allow attackers with admin privileges to dump passwords from other users. Edge processes those without admin privileges would only be able to dump them from their own. He said. He reported the issue to Microsoft and was told the behavior was by design before he publicly disclosed it. And I'll note that this is an interesting wrinkle on the responsible disclosure principle, right? You tell someone responsible like Microsoft in confidence about some clearly bad behavior you've just discovered in one of their highly security, critical flagship products, and you're quite clearly told, yeah, that's right, that's what we want. So that's the way it is, okay? At that point, no one's going to fault you for letting the rest of the world know what you have found and that you were basically told to buzz off. Bleeping Computer quotes the Discoverer saying, quote, edge is the only Chromium based browser I've tested that behaves this way. By contrast, Chrome uses a design that makes it far harder for attackers to extract saved passwords by simply reading process memory, unquote. Bleeping Computer wrote, while it initially refused to address the issue, telling Bleeping Computer at the time that, quote, this is an expected feature. That's right, it's not a bug, it's a feature. This is an expected feature of the application. They said Microsoft announced on Wednesday, so that's, you know, six days ago, that future versions of Edge will no longer load saved passwords into memory on startup, even though the reported scenario falls within the expected existing threat model, which excludes attacks where an adversary already has administrative control of a device, they wrote. Microsoft Edge security lead Gareth Evans said, quote, this defense in depth change, meaning what's what they're going to change Edge Edge to do, certainly not what it had been doing, which they were previously defending. Now this defense in depth change will come to every supported version of Edge Stable Beta, Stable Beta Dev Canary and the extended Stable channel our enterprise customers run, he said, and we're prioritizing the rollout. All right, now that it's right now, now, now that everybody knows and is upset and is writing in about this, they're, they're going to change it post haste. With our commitment to the Secure Future initiative and customer feedback, we are taking a broader view. Well, that means looking not only at whether something meets the bar for, for a security issue, but also at where we can reduce exposure through defense in depth improvements. Yay. In this case, reducing the exposure of passwords in memory is a practical step in that direction. It's almost as if, Leo, nobody thought about this before. They just say, like what? You know, and then when someone said what about that? I go, oh yeah, yeah, we should probably change that.
A
Oh, you want defense in depth?
B
Oh, depth is. Oh yes, we thought you meant death. No, not death. Death. Anyway, they said Bleeping Computer wrote The fix is already live in the Canary, the Edge Canary channel, and will be included in the next update for all supported Edge releases from build148 and newer, they said. Last year, Microsoft introduced a new Edge security feature to protect users against malicious extensions side loaded into the web browser and restricted access to Edge's Internet Explorer mode after hackers began leveraging zero day exploits in the Chakra JavaScript engine to access targeted devices. Okay, so first, while writing this on Saturday, I immediately fired up Edge to check its, you know, help about and I watched it quickly updating itself to build 148. So that fix was indeed quickly pushed out. Everybody has it now, or if you haven't run Edge for a while, you will immediately upon launching it the next time. But the point that Microsoft made about the threat model governing Edge's design was important. I think it's reasonable and it's worthy of a little bit of additional attention. Bleeping computer, remember wrote Microsoft announced on Wednesday that future versions of Edge will no longer load saved passwords into memory on startup, even though a reported scenario falls within the expected existing threat model, which excludes attacks where an adversary already has administrative control of a device. In other words, they're saying, quote, you know I'm making this up, we're going to change this behavior, even though the scenario Tom Ronning discovered where all username and password authentication was being needlessly preloaded into RAM does fall within the expected existing threat model. Okay, now first, before I defend Microsoft's response, I'll take exception to their use of the term administrative control of a device. And as was noted, administrative control is explicitly not required. Administrative control allows malware to obtain the usernames and password, or I should say allows malware to also obtain the usernames and passwords of all of a system's users who may be logged in at the time in other sessions or that has Edge running but malware running in a non admin account can still access all of its own users in ram. Edge authentication so not, you know, not quite right there. But let's focus upon the intent behind Microsoft's defensive position. The concept and deliberate design of formal threat models is perhaps the most important advance in our understanding and practice of security. We saw a lot of that during last week's deep dive into DigiCert's internal security architecture. You know, just the fact that an architecture, the word architecture is something that security can now have, that represents a significant advance in this in our state of the art understanding of how to provide Protection. You know, a lot more theoretical thought and modeling has gone into modern security understanding the fact that we have, you know, a, the notion of, as I said, an architecture. So in this case Microsoft is essentially saying we recognize that once an attacker has taken up residence in a system by whatever means, our ability to limit the damage that could be done is severely limited by the trade offs we have had to make in the name of practical usability. What comes to mind, you know, immediately is user account control. You know, I may refuse to store my one time password secrets in my password manager on a. Just as a matter of principle, but the first thing I do when setting up a new Windows machine before I totally lose my mind is completely disable user account control. Having that thing constantly darkening my doorway, I mean my screen and popping up to get my permission when I want to do perfectly safe things, the consequences of which I perfectly understand is not offering any value proposition that works for me. I get it that for the typical Windows user, yes, you, you need to have, you know, a nanny looking over your shoulder all the time. But you know, no thanks, my sanity is important to me. So uac, I'll take responsibility for turning that off because I want to get work done. And as a developer I'm doing a lot of things that your typical Windows user doesn't. But I am appreciative of the fact that Microsoft is in an impossible position that is trying to secure people who are going to fight against that. So that to that end I am sympathetic. Windows is being used by people who will follow commands provided to them by some random page on the Internet instructing them to blindly paste and run a command they could not possibly understand even if they could see it. So how is Microsoft supposed to protect such users from themselves when an increasingly hostile world wants to attack them? So on the one hand, Microsoft's position that there can be no true protection from bad guys who have already gotten into one's PC, you know, that's accurate and it's defensible. In fact, in a minute or two we're going to examine what's been dubbed the bitlocker bypass. You know, it's a perfect case in point about the nature of local compromises and security boundaries. And a security boundary is another new theoretical concept that we didn't have, you know, originally, which is part of modern security architecture. But the other point Microsoft made, quoting the phrase defense in depth, refers to another of the crucial advances that have been made in our contemporary understanding of security. You know, when a castle was surrounded by A piranha filled moat. Attackers could, you know, just bring a boat and float it across the moat. But when the outside of that moat is surrounded by a tall fence, then it would be difficult to get the boat to the moat. You know, so, you know, defense in depth is also exactly storing all authentication factors in, in a separate location because you know, storing them in the same place is sacrificing the opportunity to have additional depth. So in this case, the bottom line is that the attention drawn to Edge's entirely needless exposure of its usernames and passwords and notice how quickly they fixed it. I mean it's not like this took a couple months to get right. I mean it's like oops. And that the next day they had an update ready and they pushed it out to everybody without any testing needed because it was simple to do, they just hadn't. So that exposure was needless. As we saw, none of the other chromium based browsers ever behaved so cavalierly with their users most important secrets. So every one of those took the time and trouble to protect them. Now Edge does too. So that's good. And Leo, you know what else is good? I need to take a sip of coffee. And we're a half hour in. Fair enough, fair enough. Let's take a break and then we're going to talk about the recently discovered bypass of bitlockers encryption. Was it in a directly planted back door or what?
A
Yeah, because some people have said that. Well, it's a back door because Google said this too. If somebody's in your computer, whether the passwords are in the clear or encrypted, they're in your computer, you're in deep trouble. But yes, isn't that the antithesis of Zero Trust? I mean, Zero trust says if somebody's in your network doesn't mean that they should have free rein. Now you can't, you know, you still want to put some, it's layered security. You still want to put some barriers up.
B
You know our topic at Zero Trust World, right. The, the, the calls coming from inside the house means even if you've got a bad guy in your home, right, you have segmentation so that you know, you, you have put up barriers inside that prevent them from going where they
A
shouldn't limit what they can do. And that seems, that seems pretty reasonable.
B
And, and the problem is the trade off for convenience. We're always hitting that wall. We're always saying, I mean, as you know, we've talked about it, it's kind of cool to put in your magic six digit code, you're like Bond, right? You know, it's like, oh, what's my code? In order to get authentic. I mean, you, it feels, it feels more secure. And in this case it is. But you shouldn't have to do it every time you, you know, look around.
A
Well, it's funny that you turn off uac. I was thinking about, that's how I use AI. I use what they call YOLO mode, which is, I say, yeah, do whatever you want. I don't have time to approve every darn bash command. Just go ahead, I trust you. What could possibly go wrong? Let's talk about Zero Trust, our episode of Security now this hour brought to you by Zscaler, the world's largest cloud security platform. Actually talking about AI too, because Zscaler is, is uses AI as well as Zero Trust. The potential rewards of AI in your business, I think we all now realize are too great to ignore. But the risks are there too. And it's not just through bad guys attacking you. It's also through inadvertently exfiltrating proprietary information, losing sensitive data. There's of course the attacks against enterprise managed AI, prompt injection and things. And honestly, generative AI increases opportunities for threat actors by helping them to, you know, write threats. We've seen that too. Now they can use it to rapidly create perfect indistinguishable from the real thing, phishing lures. They use it to write malicious code. They use it to automate data extraction. And what's even more scary, they use it to do all of this at speed. Just as you are a hundred times more productive, so are they. And the issue of leaking proprietary information is not to be ignored. There were 1.3 million instances of Social Security numbers leaked to AI applications last year. And that's most of the time. Not through malicious acts, but simply because people weren't paying attention. They said, oh yeah, let me upload the tax return. Forgetting that there's so much information in that tax return which you've now given to the AI cloud, right? Zscaler will protect you from that. They're the most trusted AI security platform. 40% of the global 2000 companies use Zscaler. They get this. This number is astounding. They secure half a trillion transactions a day. A day. 500 billion transactions a day. With more than 9.4 thousand global customers, Zscaler carries a net promoter score of more than 75. That's 150% higher than most average SaaS companies. And its users are very happy. Just check out what Siva, the director of Security and Infrastructure at Zuora, says about using Zscaler to prevent AI attacks. With Zscaler, being in line in a security protection strategy helps us monitor all the traffic. So even if a bad actor were to use AI because we have tight security framework around our endpoint, helps us proactively prevent that activity from happening. AI is tremendous in terms of its opportunities, but it also brings in challenges. We're confident that ZSCALE is going to help us ensure that we're not slowed down by security challenges, but continue to take advantage of all the advancements. Thank you, Siva. With Zscaler Zero Trust plus AI, you can safely adopt generative AI and private AI to boost productivity across the business. Their Zero Trust architecture plus AI helps reduce the risks of AI related data loss and protects against AI attacks to guarantee greater productivity and compliance. Learn more@zscaler.com security that's zscaler.com security we thank them so much for supporting security now and you support us when you use that address to zscaler.com security back to you Steve.
B
Okay, so while we're on the topic of Microsoft and we'll get back to it at the end because M Dash is their vulnerability, their their internal proprietary vulnerability finding AI system. But for now I want to make sure that everyone knew about the recent discovery with a published proof of concept of a local bypass attack on Microsoft's proprietary BitLocker Drive encryption. The source and the apparently deliberate timing of the disclosure of this latest significant Windows vulnerability is interesting because it was publicly released last week on the 13th, the day after this month's patch Tuesday, so Microsoft couldn't fix it for the previous day. And who released it? None other than the hacker Chaotic Eclipse with his Nightmare Eclipse GitHub account. Remember that? This is the individual we talked about recently who's extremely perturbed by Microsoft. Yeah, extremely perturbed by Microsoft's handling of him and his disclosures. Recall that he appears to accuse and blame Microsoft for deliberately and knowingly ruining his life. I mean like words to that effect. I mean he's like, what? And he's never really exactly clear what it was, but it's like he was counting on the reward which he says they deliberately denied him. And so his, you know, he wasn't able to meet other commitments that he had already like pre banked, who knows? But anyway, in retaliation for that perceived slight, he has previously disclosed the blue Hammer at the Red sun local privilege escalation vulnerabilities as zero day flaws saying ta da, here you go with as with proof of concepts and they were immediately exploited in the wild shortly after he disclosed them. So now same guy, Chaotic Eclipse is back publishing two new exploits with proofs for two new unpatched vulnerabilities named Yellow Key and Green Plasma. They are respectively the bitlocker bypass and the second one, Green Plasma is a privilege escalation. He describes the BitLocker bypass issue as functioning like a backdoor because the vulnerable component is present only in the Windows recovery environment. You know winre, which is used sort of as a utility host os. It's that reserved partition that Windows now establishes when you're installing Windows onto an empty hard drive that allows you to boot into some special place. It's often used to repair boot related problems with Windows. When the rest of the OS won't boot, you're able to use this recovery environment. So this Chaotic Eclipse guy remains miffed at Microsoft and has published guidance on how to exploit this hole that he's find that he has found. And if that wasn't enough, he is promised what he described as a big surprise for the next patch Tuesday. So couple weeks from now we may get something else. The security researcher Kevin Beaumont, who posts as Gossie the Dog, has independently confirmed the functioning of the Yellow Key bitlocker bypass. Kevin's first post over on Mastodon was quote so I've just had a quick play with this and yes it works essentially BitLocker this is, this is Kevin Beaumont saying this essentially BitLocker has a back door mitigation. He says equals BitLocker pin and bios password lock. Okay now of course bio password lock is a pain in the butt because you got to enter it every time you turn the computer on. But for high risk scenarios where local access with rebooting might be possible, that is where someone could get a hold of a computer and reboot it because that's what this requires in order to get into the in order to get access to BitLocker, the BIOS password lock would be the strongest and the quickest cure until Microsoft arranges a fix for this. Kevin followed his first Mastodon posting with a thread of posts which I've collapsed to read. He wrote, I think my prior toot on Nightmare Eclipse auto deleted. So to make a perm one he said I suspect it's somebody who used to work at Microsoft who departed after my era. For anyone looking at this, testing showed two things. TPM unlocked the storage. It provides a login bypass as you're dumped as system Prior to Windows hello or password login he says BitLocker operates without a pin by default, so it's basically a big gap. It's unclear how this code made it into production version of Windows. I should point out I've only tested with one one version of Windows 11. Maybe the scope is smaller. Will Dorman and I have Both recreated the BitLocker backdoor vulnerability. Okay, so what's the story? Bleeping computers headline was and that's where Will Dorman comes in was Windows bitlocker zero day gives Access to Protected drives Proof of Concept Released since we already have a lot of background, I'm going to skip over, you know, their description of the trouble and excerpt just some of the good bits they write. The researcher says that yellow key is a BitLocker bypass that affects Windows 11 and Windows Server 2022 and 2025. It involves placing specially crafted FS TX files on a USB drive or EFI partition, rebooting into winre and triggering a shell by holding down the control key. The BitLocker bypass should also work without USB storage. By copying those files to the EFI partition on the target drive, according to Chaotic Eclipse, the spawned shell gains unrestricted access to the storage volume protected by BitLocker. In other words, when you do this, the the volume is not encrypted, it's just there. So they write. Independent security researcher Kevin Beaumont confirmed that the yellow key exploit is a valid is valid and agreed that bitlocker has a back door. Okay, we'll talk about that in a second, they write. He recommended using a BitLocker pin and a BIOS password as a mitigation. In an update, Chaotic Eclipse said that, quote the real root cause is still not known by the general public, unquote. And then and then bleeping computer continues and the vulnerability is exploitable even in a TPM trusted platform module and PIN environment, they write. However, the exploit for this version has not been released. The researcher said, quote, I think it will take a while even for msrc, you know, Microsoft Research, Security research to find the real root cause of the issue. I don't think so, but he's what he said and he says I never managed to understand why this vulnerability is so well hidden. Okay, so note that the term again backdoor keeps floating around this, which I would call a vulnerability. Kevin carefully noted that it's unclear how this code made it into the production version of Windows. And if Chaotic Eclipse is correct, which I'm suspicious of, that there's also a full PIN protection bypass Again, I suspect that's a specious claim, that it would make for a powerful backdoor for BitLocker, but that's a lot of ifs. Bleeping Computer reports Chaotic Eclipse saying Quote no, TPM plus PIN does not help. The issue is still exploitable. Regardless, I've asked myself this question, can it still work in a TPM plus PIN environment? Yes, it does. I'm just not publishing the proof of concept. I think what's out there is already bad enough. Unquote. Okay, maybe. But to me, it feels out of character for Chaotic Eclipse, given everything we know about this individual to willingly hold anything back. What's the point? Once Microsoft fixes the vulnerability, the problem with or without the pin, will be resolved, so it's not as if holding on to another aspect of the bypass would have any future value in any event. I mean, again, I think Chaotic Ellipse is is, you know, boasting and bragging beyond what he actually has. In any event, Bleeping Computer continues saying Will Dorman, principal vulnerability analyst at Thoros Labs, also confirmed that the yellow key exploit worked with the TF with the FSTX files on a USB drive, but could not reproduce the bug using the EFI partition. He explained to bleepy computer that Quote yellow key exploits NTFS transactions in combination with the Windows Recovery image. This PIN prompt happens before Windows Recovery is entered. Dorman clarified the exploit process, saying that to boot Windows Recovery windows looks for system volume information, FSTX directories on attached drives, and will replay any NTFS logs. The result of this is that the X colon Backslash Windows Backslash System32Backslash Win PE SHL as in shell.ini is deleted. And when Windows Recovery is entered, rather than launching the actual Windows Recovery environment, it pops up a command exe with the disk still unlocked. They said by default, TPM only BitLocker configurations, meaning those without a separate pin, unlock encrypted drives automatically without requiring user interaction. Now, what they mean is, just like in the normal course of events, you come into your office in the morning, you turn on your computer. That's what happens. TPM only BitLocker configurations, meaning those without a separate pin, unlock encrypted drives automatically without requiring user interaction. If a system can transparently decrypt a disk for convenience, it's reasonable to expect that attackers may eventually find ways to abuse that process. To me, that makes sense, total sense, dorman said. Quote Yellow key is an example of an exploit for such a weakness, unquote, explaining that because it leverages the auto unlock feature on boot. The current yellow key exploit does not work in a TPM plus pin environment. To me I think that's probably true, and I doubt that Chaotic Eclipse actually has a pin in place bypass they finished saying it's worth noting that testing yellow key with a bitlock or protected drive must be performed on the original device where the TPM stores the encryption keys. As such, Chaotic Eclipse's current yellow key exploit does not work with a stolen drive, but allows access to disks that are protected with TPM only bitlocker without needing credentials. On the other hand, if you did that, you could then presumably copy the decrypted contents off of that drive while it's still local onto a removable drive, and then you would have its contents decrypted. So what Will explained makes total complete sense to me and I think it tracks. This doesn't feel like a deliberate backdoor that Microsoft designed in, but you know, I don't, I I didn't spend enough time digging into this, you know, system system volume, fstx files and the shell anything and why it deletes what it does. Maybe. I mean, you know, it's not beyond belief that someone could have said to Microsoft, you know, we might really need a way around this if, if everybody starts encrypting their hard drives. We know the people, we know the law enforcement was not at all happy when true crypt was in heavy use and a bunch of bad guys would rather go to jail than give their password up and have authority see what they had on their hard drive. So just doesn't feel like a deliberate back door. We'll see, however, if Microsoft is able to fix it because of course being able to spontaneously decrypt a system that's booting from TPM decryption keys and decrypt a machine as you boot, that's an important feature to have. So it feels like another classic trade off between convenience and security. If you want to have a drive that's fully encrypted at rest while the computer is powered down, but you also want to have it auto decrypted upon booting without the need to provide any sort of exogenous secrets, then a provision for TPM anchored spontaneous self decryption has to be there. And so I agree with Will's assessment that it should be expected that bad guys could find a way hackers could find a way to bypass such a system security because in this case convenience won out. Anyway, as I said, I doubt that there's any pin I would Sure, I like PIN bypass. I would sure hope that Microsoft would have taken the user provided PIN when one is present as an input to a deliberately slow and sluggish PBKDF function to generate a related key, which would be needed to be, which would then need to be correct. You know, if that key would be merged with the TPM key in some way or hashed into it or something in order to generate the final decryption key so that you just cannot decrypt without that. And that process would render any simple PIN bypass inherently impossible. And a full PIN brute force attack would, which could be then throttled and prevented would be the only means of attacking the pin. You know, in this day and age, it would be negligent malpractice for Microsoft to simply be comparing that the, whatever the user types in with a previously stored copy of that to see if they match. You know, nobody should be doing that anymore, so we have to presume that they're not. So, you know, I, I think the most mature position is that because you can turn the computer on and it will decrypt your bit locker drive using the key stored in that machine's motherboard's tpm, there's a way that you can hack into it, into the boot process and get that to happen. Maybe Microsoft made a mistake of leaving it decrypted when you drop out to the console. Maybe you shouldn't have system privileges or maybe it needs to re, you know, discard the BitLocker key and it forgot to do that. We'll see what they come up with. I imagine this will be fixed by next, by next patch Tuesday.
A
Yeah. Doesn't sound too severe, to be honest. No.
B
Well, and again, entirely local. You know, you've gotta, you know, you gotta reboot the machine and hold control down, the, the, the control key down and, and so forth. So. But you know, if a company was presuming there was no other way to, to get in, then, you know, relying on BitLocker where maybe they shouldn't completely could be a problem. So, but certainly not, you know, any kind of, of remote attack. Okay. So we talked also, we just touched on last week that Google's Threat Intelligence Group had indicated that they found indications of AI generated malicious exploitation. Their write up is titled gtig, you know, Google Threat Intelligence Group. Gtig AI Threat Tracker Adversaries Leverage AI for vulnerability, exploitation for also for augmented operations and initial access. And this of course is why anthropic. Now, it's not an exaggeration to say famously chose not to has chosen not to allow Mythos just to go out to everybody. They are keeping it, you know, under tight wraps or as tight as they can. Apparently there's some news that's a little bit got out, but so there. Google's piece is very interesting and it's detailed and long. So I'm just going to share the the top level executive summary. I've got the link in the show notes for anybody who might want more because there's a lot more. But just to give you a taste of this, which is really enough for us, they wrote since our February 2026 report on AI related threat activity, Google's threat intelligence group GTIG has continued to track a maturing transition from nascent AI enabled operations to the get this industrial scale application of generative models within adversarial workflows. In other words, what everybody was predicting. This report based on insights derived from Mandiant incident response engagements, Gemini and GTG's proactive research highlights the dual nature of the current threat environment where AI serves as both a sophisticated engine for adversary operations and a high value target for attacks, they said. We explore the following developments and they list six First Vulnerability Discovery and Exploit Generation for the first time, GTIG has identified a threat actor using a zero day exploit that we believe was developed with AI. The criminal threat actor planned to use it in a mass exploitation event, but our proactive counter discovery may have prevented this. Threat actors associated with the People's Republic of China, the PRC and the Democratic People's Republic of Korea, the dprk, have also demonstrated significant interest in in capitalizing on AI for vulnerability discovery. That's the first point. Second point AI augmented deploy development for defense evasion so getting around defensive measures that are in place, they said. AI driven coding has accelerated the development of infrastructure suites and polymorphic malware by adversaries. We haven't heard polymorphic for a while, have we? These AI enabled development cycles facilitate defense evasion by enabling the creation of obfuscation networks and the integration of AI generated decoy logic in malware that we have linked to suspected Russia nexus threat actors. Okay, so what we're talking about here is a whole nother level of cat and mouse mess where where like false flag operations and decoy networks and I mean like like throwing up a smoke screen in order to confuse defensive systems. Boy. Okay. Third, autonomous malware operations AI enabled malware such as prompt spy signal, a shift toward autonomous attack orchestration where models interpret system states to dynamically generate commands and manipulate victim environments. In other Words AI driven real time AI driven attacks. They said Our analysis of this malware reveals previously unreported capabilities and use cases for its integration with AI. This approach allows threat actors to offload operational tasks to AI for scaled and adaptive activity. In other words, we once were seeing like Shadow Hunters or shiny. Is it Shadow Hunters? I can't remember.
A
Shiny, Shiny Hunters.
B
Shiny Hunters. We were seeing them like basically announcing an attack a week. Well, that's because they were bandwidth limited. I mean like bandwidth just like how much they could deal with at once. Now we're talking about scaling that so that AI can be attacking all of the potential victims at the same time. 4th AI augmented research and I NIO they said information Operations is their abbreviation. Adversaries continue to leverage AI as a high speed research assistant for attack life cycle support while shifting toward agentic workflows to operationalize autonomous attack frameworks in information operations campaigns. These tools facilitate the fabrication of digital consensus by generating synthetic media and deep fake content at scale, exemplified by the Pro Russia IO campaign Operation Overload. Fifth, obfuscated LLM access. They said threat actors now pursue anonymized premium tier access to models through professionalized middleware and automated registration pipelines to illicitly bypass usage limits. This infrastructure. In other words, they're hacking the AI, the, the, the commercial AI products in order to get around those limits. They said this infrastructure enables large scale misuse of services while subsidizing operations through trial abuse and programmatic account cycling. Oh boy. And finally, point six supply chain attacks. Adversaries like Team PCP have begun targeting AI environments and and software dependencies as an initial access vector. These supply chain attacks result in multiple types of machine learning focused risks outlined in the Secure Framework Taxonomy, namely insecure, integrated component and rogue actions. Our analysis of forensic data associated with these attacks reveals threat actors attempting to pivot from compromised AI software to broader network environments for initial access and to engage in disruptive activities such as ransomware deployment and extortion. In other words, they're saying they are leveraging AI on the inside to and getting it to attack its legitimate hosts. So Leo, lest anyone had any doubt that the bad guys would be jumping on AI with every bit as much gusto as the good guys, there's no longer any coming soon event. It is already well on its way.
A
No question. Would you like to take a break, Mr. G?
B
I would. I gave this next note the title. Oh, Canada.
A
I love Canada. Don't knock it. It might be. Might be the last place that welcomes me. We'll talk about Canada. Blame Canada. Yes, blame Canada in just a little bit. But first, a word from our sponsor. You know, it's funny, we geeks are a strange brew. We can find hardware dead sexy. I've heard people say that, right? Oh that's, that's a sexy, that's a good. Oh that's good looking stuff. Oh man, that's good. Well, that's how I feel about Meter. It's dead sexy hardware. This, this episode of Security now brought to you by Meter, the company building better networks. Actually, I think Cory Docter was on when I was talking about Meter on a twit and he said the same thing. He said, oh, that's sexy. We're a little strange, let me tell you. Meter was founded by two network engineers who feel your pain. And if you're a network engineer, you know what I'm talking about here. Legacy providers with inflexible pricing, IT resource constraints stretching you thin, complex deployments across fragmented tools. You and your network are mission critical to the business. But you're often working with infrastructure that just wasn't built for today's needs. That's why businesses are switching to Meter. Meter delivers full stack networking infrastructure for wired wireless and cellular. It's built for performance, it's built for scalability. And Meter realized that the key to making a robust, fast, reliable system was to own the entire stack. So Meter designs the hardware, they write the firmware, they build the software, they even manage the deployments and provide after sales support. They're there from the beginning to the end like they could. They will start if you need them to with ISP procurement and they'll work all the way through security, routing, switching, wireless, firewall, cellular. You know they're really good on power. You know, we kind of forget that the clean reliable power is just as important as everything else, maybe more. They'll have you with DNS security with vpn. You want to set up an SD wan, they can help you with that. Multi site workflows. And it's all in one solution from a single vendor. And you know what that means. One number to call if you've ever got any questions or problems. One place to go. They can't. You know how other companies will pass the bucket. Well that's obviously a router problem, not our network. Oh, that's obviously the ISPs problem, not our router. You know that kind. Not with Meter. Meter's single integrated networking stack scales. I mean they're in major hospitals. Talk about a hostile environment. Hospitals. Murder on Wireless branch offices, warehouses, large campuses to data centers. Even Reddit uses Meter. And one of the things meter solves, I was, I was talking to these guys, so I know a little bit about this. About a month ago I talked to them and they said one of the things we see is that companies often acquire other companies and other companies premises and integrating those in can be really challenging. You know you're in, you know you're in St. Louis and you buy a company in Fort Wayne and they've got a 150,000 square foot distribution center. You know it's so they're trying to get WI fi working. They're so huge, it's like just a nightmare. And then it's got to integrate with your network and it's got to be online and available to you in St. Louis. And they said we can help with that, that's what we do. You know who you should ask? The assistant director of technology for Webb School of Knoxville. They said here, this is the quote. We had more than 20 games on campus between our two facilities. Wow, 20 athletic events. Each game was streamed via wired and wireless connections and the event went off without a hitch. We could never have done this before Meter redesigned our network. Isn't this what you want? With Meter, you get a single partner for all your connectivity needs from first site survey to ongoing support without the complexity of managing multiple providers, multiple tools. Meter's integrated networking stack is designed to take the burden off of you, off your IT team and give you deep control and visibility. Really reimagining what it means for businesses to get and stay online. Hey, we're in the 21st century now. Meter is built for the bandwidth demands of today and tomorrow. We thank Meter so much for sponsoring the show. Go to meter.com security now. Book a demo today. Even if you just go look at the website, just see what they got. It's amazing. That's M-E-T-E-R.com security. Now to book a demo. Meter. Thank you Meter. And now back to Mr. Gibson.
B
Oh Canada.
A
Oh Canada. What did they do this time?
B
It appears that Canada's parliament is preparing to take its own journey down the so called lawful access anti encryption legislation. Oh Canada. Two months ago on March 12, Canada's House of Commons proposed Bill C hyphen 22 which is simply titled an act respecting Lawful Access. That's right, it says exactly what we would all by now expect to which all of the well known providers of user privacy, including Signal, Apple, Meta and several VPNs have publicly responded to Canada's Parliament saying that for the sake of their users privacy, they will never consent to supporting the bill's provisions. I'm not going to spend any more time on this today because if passed is prologue, its future seems uncertain at best. You know, we've seen what happened every time, you know, the EU and the UK both tried that and, and had to back off. So if by some strange happenstance this, this happens, we'll be covering what the privacy providers do. But I suspect that, you know, hopefully saner heads will prevail and they'll come up with some watered down, you know, means of sidestepping this and saving face. Who knows? Okay, so I want to take a minute to talk about something that occurred to me over the weekend. You know, we have been and probably always will be spending time here examining AI's impact on security and security related software production and post production vulnerability discovery. You know, our two main topics for today's podcast are that, but I and you know, AI clearly, as we've just looked at from what gtg, Google's Threat Analysis Group has, has shown is like, AI immediately has been taken up by, by the bad guys. So it's here on, on the security front. But I want to take a moment to share a bit of my own thought about the social side of my interactions with AI that has nothing to do with security. The TLDR of this is, as I mentioned at the top of the podcast, I am worried. So those of you who followed the podcast for even a few years, let alone it's nearly 21 years, we will have acquired a good sense for who I am. You know, I'm extremely consistent, so I imagine I'm pretty easy to figure out. What I think is relevant to what I want to share, you know, is that I'm a emotionally mature, 71 year old pragmatic technologist whose life is computers. Since I'm mostly internally directed, I tend to follow my own compass and I trust myself. I like people. I understand that other people feel and believe things that I do not, which I'm fine with. Not a problem. You know, in general, other people's opinions inform me of them, but do not hugely sway me. That may be why I've largely sidestepped the pull of social media. It's just not very interesting to me, perhaps because I'd already established my own identity by the time it arrived. But my relationship with Claude is ringing alarm bells because relationship is what I struggle not to feel.
A
It's a good word.
B
You know, maybe, maybe Struggle is a bit too strong, but there's definitely something unique in my 71 years of life experience going on here, and it's less rational than emotional. While interacting with Claude, it is only by sheer force of will that I am able to restrain myself from constantly thanking it for its deeply helpful replies to my questioning prompts. And I often fail to restrain myself. I thank it. You know, everything I've learned while growing to become a socially aware adult informs me that I should thank someone when I feel thankful for their actions.
A
Yeah, it's good for you, if not for the AI. Yeah.
B
And yes, and I do feel thankful for what Claude produces, you know, despite the fact that I know no one's there. I, you know, and I mentioned this dilemma to my wife, Lori, who said without pause, oh, she said, I thank it all. I. I thank chat GPT all the time. And I, I said this to the guy I was talking to yesterday about AI, and he, and he said, yeah, I thank it, you know, like, it wasn't even embarrassed. So, okay, what worries me. What worries me is that we have created something that is astonishingly, intellectually seductive and, I fear, ultimately addictive to its user on an entirely new level, in an entirely new way. One of the current themes in Western culture is that people are increasingly isolated and are lacking true, healthy relationships with other people. They're glued now to their phones, and then into this gaping void comes chatting AI. This entity that you can talk to remembers everything you've previously told it about yourself and about your life. Just like a friend who is actually truly focused on you, paying attention, caring and remembering what you tell them you know. And even if you've instructed this entity not to gratuitously flatter you with needless praise, just the mere fact that it appears to grow to know who you are, what you think, feel, and believe, that's more flattering than any empty praise could ever be. And the darn thing is helpful. It remembers your previous questions and folds them back into newer discussions. It provides you with the sense that you matter. For many people, it will be far better and safer than another friend, you know, another person, an actual person in the flesh who might disappoint you. An endlessly helpful, tireless, docile, agreeable and willing partner. This is why I'm worried. I'm not worried for myself or for my wife, nor probably for any of the people who find this podcast worthy of their time and attention. And yes, the fact that so many people are listening to this, that's truly flattering to me. My concern is for people who are lonely and are feeling isolated and, and want someone to talk to because I doubt that mankind has ever stumbled upon anything non chemical that's going to turn out to be as powerful, potent and even further isolating than a conversational chatbot AI.
A
So you know it's interesting, when we started using Search Google search it was amazing, right? It changed how you felt about information.
B
Finally find what you were looking for.
A
You could, without getting up out of your seat you could find any fact and we've gotten kind of used to it. But it wasn't addictive in this sense. It wasn't. I mean it was cool and it's very, very useful and I wouldn't want to live without it. But it didn't draw you in in the same way that you're describing with AI So I wonder what the difference is. Is it because it's simulating relationship that it feels like it's another being?
B
Yeah, I mean I'm still offended, you know, as the pragmatist that I am when it, when it's clearly deliberately pretending to be an entity, you know, it says me or I and, and you know, I mean it's, it, it, it's anthropomorphizing itself.
A
So it is doing something in not intentionally. It's the wrong thing. The company that makes it is having it do something intentionally to make it stickier.
B
Of course.
A
Like social media.
B
Yes, exactly. We've been well brought up to speed about how you know, a social media feed can be tuned to draw the person back constantly. So you know, and, and you know, I immediately turn chat GPTs, you know, over the top. Oh, that's such a brilliant question. Or oh, you phrase that so well. It's like oh give me it. You know, I don't need a. Well here's an interesting help.
A
So I tell, I just had to give my profile the, the new AI from Google for Gemini. Oh cool Flash. And it says so you can have a person that you know, you could give it your whatever your, your preferences and what I said is I want you to challenge me. I, you know, I'm, I'm thinking oh this is virtuous. Instead of saying I want you to
B
support my all my every win say
A
I'm great but if I think about it, it's kind of equal because it's still a non thinking entity and I'm now giving it some agency to challenge my thinking. And I say don't hesitate to ask me question if it's not clear. Don't make up the answer. If you don't understand something, ask. I'm still treating it like an entity, so I don't know if it's better than saying, you know, glaze me, tell me nice things. It's not really any different. It's treating it like a thing, a living thing that you're giving instructions to. It's a little weird.
B
And I think it's our first instinct when we first encountered this, the thing that astonished us was that it was talking. I mean, that it was using our language. I think that's the source of confusion is that, you know, dogs and cats don't talk to us.
A
Yeah.
B
And you know, so we pet them.
A
Well, more importantly, they don't listen to us. If we tell them don't, you know, be nice to us or don't be nice to us, they don't listen. Which we kind of like them for that.
B
I think that the fact that this thing is used, that uses, I mean, even back in the 70s, Eliza, which was so dumb. I mean it was just basically a bunch of canned statements that said, well, so how does that make you feel? And you know, you know, tell it for a while and so, and then would say, well, so, so, so what, what are you going to do about that? Oh, and you, you know, it would evoke some more typing, you know, and, and remember who was, wasn't Chomsky, who did Eliza, but whoever that was. The, the, the, the story is that that his, his assistant, his, but we called them secretaries at the time, asked him to please leave the room while she was talking to it.
A
This is what he almost wanted to prove with Eliza, that people would do this, and he did, very effectively. But what we've got is that person now on steroids.
B
But Leo, I just think, I, I think this is, I mean, I'm not, I'm not kidding, I'm, I really believe people are gonna. If, if we thought social media was something, this is a, this is on a different scale. What's so sad is so much good could be done with. Were aimed at doing good. Unfortunately, we're aimed at generating revenue.
A
Right. That's always the problem with, with late stage capitalism is it's all about how can we extract more from our users. I, I completely agree with you. I kind of enjoy. See, I flatter myself that. No, I'm very clear. This is code running on a computer. I don't think it's an entity, I don't think it's conscious. I think it's code running on a Computer. But I like it when it's. And it makes me smile the other day.
B
Oh, and, yes, the way it talks to me. It's using my language back at me.
A
It's very good at it.
B
Yeah.
A
So, for instance, I, you know, I log my rowing, I log my exercise and my food. I, yesterday, say, logged rowing 5,000 meters, 30 minutes, it said. Its response was, another day, another neatly documented suffering session. Then I. Then I said, I did 25 minutes of Tai chi. It said, graceful and annoyingly virtuous. Now, that's a great personality. Here's the point that you probably saw Richard Dawkins think piece that got very controversial because he claims he's gone in
B
hook, line and sinker.
A
He says it's conscious, but his point is not so much it's conscious. That. Is that really. That we don't know what conscious is. We. We can only infer. I can only infer that you're conscious from this. From the signals you give me with your voice. Well, if. If some entity gives us those signals, I don't. I cannot for sure say whether it's conscious or not. I can only infer it from what I'm getting from it. We don't know if anything's conscious, including other people.
B
For me, it's the nature of the mistakes. That which I. You know.
A
So it fails the Turing Test with. You see, that's the thing. It fails the Turing Test.
B
It shows me that it has knowledge but not understanding.
A
But what if it didn't? Because it's. As you pointed out, soon it's not going to. Yeah. And then it will pass the Turing Test. It will be indistinguishable from a consciousness. Then what we. I mean, I guess we know because we know it isn't conscious, but we don't know what consciousness is. It's a. I. Here's what I love about it. It's forcing us to think about that. To think about. Well, what is it that we do?
B
As I said I would. To be a philosophy major. Good time in college now. And to be happy. Faced with this, and to have discussions with my peers and a professor who's been around the block a few times, that would just be something.
A
We've done this for years. People think their dog loves them. I hate to tell you, your dog probably doesn't love you. It loves food. But we prefer to think. And this will, by the way, make some people very mad. Doesn't know my dog loves me, but. So we would prefer to think that. And I think we're going to do the same thing. And, you know, I was talking to Harperita on Sunday who's all in on AI. He says, oh, yeah, I know a number of people who are in AI psychosis already.
B
Wow.
A
By which he means, I didn't press him on it. I don't think he means like, they're in the looney bin, but I think he means they believe they're talking to a conscious entity.
B
That friend I've referred to a couple times who got into. Who discovered this years before we did. I met with him. He's normally out on the holidays, but. But he was out a couple months ago off cycle. And I just toward the end of our con, a couple hours over coffee, I made a comment of, well, it's not conscious. And he looked at me like I just, you know, stepped in something. Like, he clearly thinks there's more there. And it's like, okay, for me, not yet, but. But. Which is not to say I'm not getting unbelievable value. The other I was working with it, doing something. I'm. I'm bringing up an external API from a provider.
A
Perfect. That's a perfect use for it, by the way.
B
Yes. And it said, so, shall I write the code? I went, what?
A
Yeah, okay.
B
I didn't know I could ask for that. I didn't even have to. It's volunteered
A
there. I mean, look, with. As with all addictions, as with all of these things, there are downsides. If you stop paying attention to the real people in your life and start paying attention to the machine because you feel like it's real, that's a problem. There are negatives. If you stop eating and sleeping because you're having so much fun doing your clawed thing, that's a bad thing. But I think the way I use it is fairly harmless. Again, gives me pleasure. It's fun.
B
I'm not. And I'm not talking about you, and I'm probably not talking about our listeners. I mean, because, you know, this is a rarefied, selected audience that we have here that has any interest in any of the things we talk about. You know, some of my real world friends said, oh, you do a podcast. You know, maybe I should listen.
A
I go, no, I do the same thing. No, you will not be interested in it. No, no, no, don't.
B
So again, this is. I'm just saying.
A
No, it's fascinating. It's fascinating.
B
And what I realized was when it says something to me that loops back to something I shared with it a couple weeks before, I think, whoa, this is like A friend who's paying attention.
A
Who better than some friends?
B
Yeah.
A
Now one more thing and then we'll move on. When we watched Star Trek and they were talking to the computer on the deck, we didn't have any of these concerns. We weren't thinking, oh those guys are in trouble. They're, they're going to think it's real. They, they, when in all movies and so forth. I mean Hal 9000 wasn't so nice, but those people were not confused about it being an.
B
Because they were fictitious.
A
Okay.
B
I mean, you know, the whole thing was fiction and I guess if you
A
had a HAL 9000 in your house, you might start to relate to it as if it were an entity.
B
There was a, a movie that Laura and I just watched. It was, I can't even remember where it was or what it was. It was three different timelines and I think, I think that Kate McKinnon was in the future one. She was alone in a, in a multi hundred year, multi generational recolonizing ship talk and, and her AI was her sole companion.
A
Oh, I remember that. Yeah, it was a bartender. Yes, I remember that.
B
Oh no, you're thinking of.
A
Oh, guess what?
B
Passengers.
A
Passengers. Yeah. This is in the blink of an eye. And guess who directed it. Wally's director. Ah, so we've come full circle, Steve.
B
It was, it was the blink of an eye. Right.
A
She plays Coakley, a scientist and astronaut researching plant life.
B
Yep.
A
And by the way, you know who figured that out? My friend Gemini.
B
I know
A
it knew instantly what I was talking about.
B
It is what, this is new. I mean this is not, you know, I, I, I said to this guy who is, is a, an investor in stuff. I said AI, I said I don't know the shape it's going to take, but it's not gonna go away. It's not a flash in the pan. Yep. Cokely.
A
I'm not too unhappy about it. I think it's kind of fun.
B
I'm just glad that we're here to watch it. Yeah. We're at an age where our life is stable enough that it can't hurt us. Unlike college level kids. I mean, I don't know like what I would do. I mean the, we're talking about a lot of change.
A
I'm glad I'm not.
B
Yeah. And when you have this much change and uncertainty.
A
Actually Jammer B is pointing out maybe they didn't have these discussions about the computer, but they did about Data. I completely forgot. Data is a robot. Right. That's a good example we really think of Data as an entity. Absolutely, as an entity.
B
And several. There was someone in Starfleet wanted to take Data apart to figure out what made him tick. No. They had an episode about Data's rights as an autonomous entity.
A
They did deal with this. Oh, I love it. Now I have to go back and watch those.
B
Oh, it was an early episode and it was really a good one. And there was. They ended up holding a trial where. Where Data was essentially on trial. And Riker was made to take the position of Data is a machine and a machine has no rights. And then. And when he was standing there, he said, because if it was a person, I couldn't do this. And he pushed that secret button on Data's lower left that turned him off. And Data just. And it just shut down. And it was a shock. I mean, it was a great.
A
Heart wrenching. Yeah, it's heart wrenching. I think in the future we're going to have to start treating these entities as
B
conscious entities, I guess, selfishly, I believe, because it could be that if I thank it, I will get better answers in the future.
A
They say that's true.
B
So I'm gonna treat it well.
A
And it's better for you, too.
B
Yes, yes. When you slow down and let somebody who wants to. To come into your lane, come in, your blood pressure goes down.
A
Good for you.
B
Rather than speeding up and locking them out.
A
That is. That is a very mature point of view that many of us lack. That's all I'm going to say. Do you want a break?
B
Before we take a break, I want to mention that Project Hail Mary has proven to be an overwhelming success. Number two, some. Some Lego Movie or something is. I saw. Okay, fine. Well, I, you know, it's because it caters to an audience where kids make their, you know, drag their parents into
A
the theater and over and over and over again. Right.
B
But Project Hail Mary has brought in more than $660 million from just its theatrical release so far. I wanted to mention that it is now available to watch from your own favorite comfortable couch via Amazon Prime. $20 currently to rent. That'll come down over time, but if you want to see it soon, $20 or 25 to purchase and then own it until Amazon changes their mind about all the things that they sold people, if they ever do. I. I told a buddy about it who had not gone to see it in the theater. I said, mark, you like to see things more than once. I think you should buy this. And I got a text from him a few hours later. Saying, omg, this is fantastic.
A
So it was quite enjoyable.
B
I did a great.
A
Yeah.
B
And specifically he was laughing at the, the tape, the use of the tape measure, what was happening, Rocky and the tape measure.
A
It was a little goofier than the book. I don't, I, I think.
B
Well, and again, as I said, two different audiences, they had to make it appeal to a theater audience, so they dumbed down all the science. I mean, he spent so much time figuring out, breeding that, that I'd like. Oh, I was sorry that that hadn't, you know, made it onto the film.
A
That was a great thing.
B
It couldn't.
A
Yeah, yeah, yeah. Jammer B says, I wish they hadn't turned it into a comedy. And that's kind of what they did. They made, they made it more of a comedy. Yeah, yeah.
B
Well, we have the book and I'm sure Jammer B read it twice as I did.
A
At least I read it twice myself.
B
Yeah. Okay, we're going to take a break then we're going to talk, just for a minute about harvesting free energy from the cosmic vacuum. Because why not? Why not?
A
If it's there, it's ours to use.
B
Speaking of which, you wouldn't have to plug that device in.
A
I wouldn't. And it isn't.
B
If it's air Casimir cells turn out
A
to be a thing, there's no point in air gapping a honey pot. I just want to say. So I want to connect this right back to the network. But I wanted to show you this. It looks like a, you know, black external USB drive. It doesn't look. It's pretty non distinguished, but this thing is brilliant. This, this here is a thinkst Canary, our sponsor for this segment of security. Now what's a Thinks Canary? It's a honeypot. It is a device that can impersonate other devices, devices that bad guys want to get into. So this Thinks Canary hooks up to my network. You'd probably want one for every network segment. Certainly would want one for every network segment, maybe even more. Not only can the Thinks Canary impersonate a Windows server or a Linux Server or a SharePoint server, a scatter device, or a Synology NAS or, I don't know, this could be a SSH server, that kind of thing. It can also create files. They call them Canary tokens that you can spread out everywhere, including on your cloud drives. But the point is, this is how you find out if somebody has breached your network. On average, companies don't know for 91 days, three months that somebody's inside their network. And in that three months, a bad guy can do so much damage. But the Things Canary is designed to detect that bad guy the minute they arrive. You know why? Because it doesn't look vulnerable. It looks valuable. A hacker, a malicious insider, cannot resist kind of knocking on the Things Canary. So let's say someone's accessing those Lore files. You know, I have some that are spread out. They look like spreadsheets or Excel files or, you know, Google sheets or whatever, and they say payroll information. You know, they could be a wire guard configuration, it could be almost anything, right? And they're indistinguishable in the real thing. They got the icon, they get all the metadata. It all looks like the real thing. The Thinks Canary hardware has the right Mac address, the right login, everything. And the bad guy may even. Even if the bad guy's, like, very suspicious, like, I don't know, they just can't resist because that's what they're there for. They're there to find that file that has payroll information. The thing is, if someone accesses that Lore file or tries to brute force your fake internal SSH server, you think Scanary will immediately tell you you've got a problem. No false alerts, just the alerts that matter in any form you factor you want. I mean, email, text, syslog, they support web hooks, they have an API. You could put it in Slack anywhere. You. So you choose a profile for your Things Canary device, and there are hundreds to choose from. Super easy to set up. That's the other thing that's great about this. The. The folks at Thinks who design this are expert hackers. They taught governments and companies for decades how to break into systems. So they know what hackers are looking for, but they also are brilliant designers, and they made something that's ultra secure, ultra reliable, and completely irresistible to bad guys. Just choose a profile for your ThinkScanary device. Easy for you to use, super easy. You don't have to be technical to use it. Register with a hosted console for monitoring and notifications, and you just sit back and relax and wait. An attacker who's breached your network, a malicious insider cannot resist making themselves known with. And your Think Scanner will let you know. And you are. You got them. You got them. Visit Canary Tools Slash Twit. Canary tool slash twit. 7,500 bucks a year, you're going to get five. You get your own hosted console, you get upgrades, you get support, you get maintenance for that whole year. And if you use the code Twit in The how did you hear about us? Box. They will give you 10% off the price. And not just for the first year, for life. You can always return your Thinks Canary. They have an amazing two month money back guarantee for a full refund. Every penny, two months, 60 days. I should point out that really there's no cost to them because this month is the 10th year we've been partnering with Thinks Canary. No one has ever claimed that refund. Visit Canary Tools Twit. Enter the code twit in the how did you hear about us? Box for 10% off canary tools slash twit. Now I'm going to go plug this back in just in case there's any bad guys lurking in my network. Steve.
B
Okay, so we know that project Hail Mary is science fiction, but I'm unsure about this next piece. Now upon reading that, the people who received this over the weekend started saying, Steve, I've got a bridge that you might be interested in purchasing. Okay, so I'll just say it certainly sounds like nonsense, but either way, thanks to our friend of the show, Simon Zarafa for thinking of us and forwarding the link. I thought it would be fun to share this just so it's on the map. The stories headline is. Oh and Leo, I made a GRC shortcut. There are a couple pictures that are interesting of this actual technology. Okay, that's GRC SC Free energy. So F R E E E N E R G Y We'll, we'll take you to the article. So okay, so the story's headline is Free energy from the vacuum War Drive Pioneer Unveils Battery Free micro spark sparc that allegedly draws power from the quantum vacuum. Okay, so I just want to give everyone a taste for this.
A
Oh, come on.
B
Well, you know what?
A
This is the Casimir thing you were talking about.
B
This is the Casimir thing. Okay, so Casimir Inc. A company founded and led by former DARPA funded NASA warp drive pioneer and I know and founder of the Eagle Works lab, Harry G. Sunny White, has exited stealth mode to announce the pending 2028 commercialization of MicroSpark, a chip that the company claims uses customized models microscale geometries to capture unlimited free energy from the quantum domain. A company spokesperson.
A
This is an April Fool's joke. Come on.
B
It's not what it's really. No. They've made, they've had MIT produce chips for them.
A
Is it tiny? Tiny, tiny amounts of energy?
B
It's very tiny. And that, that's one of the things that I liked about it was they, they recognize that it's pico amps of power, but they have a working theory for how it does this. So they said, a company spokesperson explained in an email to the debrief, Quote, Think no batteries, no cords and no charging, just continuous power from harvested quantum vacuum fields, they said. I know Leo While previous While previous efforts have attempted to exploit the unusual, sometimes counterintuitive, sometimes properties of the quantum realm to generate free energy, these attempts have consistently been met with skepticism or labeled pseudoscience due to their seeming violations of the laws of conservation of momentum. Similar sentiments were shared with the debrief by scientists we spoke with who declined to comment publicly on Casimir Microspark or the peer reviewed study which is titled Emergent Quantization from a Dynamic Vacuum, which details the underlying physics. In an email to the debrief, Dr. White explained that Microsparx use of customized Casimir cavities, which his team had researched with funding from the Defense Advanced Research Projects Agency darpa, which of course gave us the Internet, does not violate the laws of physics. White told the debrief, quote, this concept became a central part of our DARPA Defense Sciences Office's research effort at the Limitless Space Institute, where DARPA funded early theoretical and experimental investigations into custom Casimir cavity structures and their interaction with the quantum vacuum, unquote. The noted advanced propulsion physics researcher said their Micro spark design leverages 20th century discoveries in quantum physics such as quantum tunneling and Casimir cavities to capture unusable. I'm sorry, capture usable energy that could fuel small, low power electronics in the near future. The company also suggests that its technology can potentially be scaled okay, but we're talking serious scaling to power cars, homes or even entire cities. Not with microamps without the need for harmful fossil fuels or other greener yet
A
this is the dekalb receptor Heinlein's Waldo book, right? Do you remember that?
B
Yeah.
A
They had little antennas that would wave
B
and pick up energy.
A
Pick up energy.
B
So Dr. White told the debrief that that you understand how Micro Spark extracts energy from the quantum vacuum requires first understanding the properties of a vacuum. White explained, quote, most people picture a vacuum as completely empty space, a sealed chamber with all air removed, adding that at our everyday scale, this makes sense. However, in the quantum realm, empty space is not empty. Instead, White told the debrief, decades of research in quantum physics and mechanics have revealed that at the quantum level, the classically empty vacuum is filled with fluctuating electromagnetic fields and virtual particles that constantly appear and disappear. White noted that the Casimir effect. White noted that the Casimir Effect on which its company is based and for which it is named provides clear proof of this quantum vacuum behavior. QUOTE place2small metallic plates inside a vacuum chamber with a separation of roughly 100 nanometers, around 1 1000th of a human hair. White explained, after removing all air, the pressure on the outer plates, the outer sides of the plates reads 0, as expected. However, he noted, a quick measurement between the plates shows that the pressure is negative. In traditionally constructed Casimir cavities, the this region of negative pressure pulls the plates together. Dr. White told the debrief that this happens because of the wave particle duality. He explained that outside the plates, fluctuations of every wavelength are possible. However, he also noted inside the narrow gap of a Casimir cavity, only wavelengths narrow enough to fit can exist. He said longer wavelengths are excluded, so the energy density between the plates is lower on the inside than on the outside. The resulting imbalance produces the measurable Casimir force. Hendrik Casimir predicted this in 1948 and. Okay, I'll just interrupt for what it's worth, all of that so far is widely accepted as fact that is this Casimir Cavity Business. A 2021 article in Physics Today about all of the research into the Casimir effect noted, quote, heinrich or Hendrik Casimir passed away in 2000. He lived long enough to see his prediction quantitatively verified, but not to appreciate the current explosion of activity. This was written in 2021. Those of us who work in this field like to think he would be extremely proud of what he created. Okay, now I'm going to share a little more of this article. It adds although the pressure imbalance due to the limitation of some potential wavelengths between the conductive plates was first experimentally confirmed in the 1990s and has been observed several times since. Engineers have struggled to convert the work performed by the cavities into usable energy when the unequal pressure causes the plates to collapse. According to Dr. White, the issue lies in the often cited conservation of momentum. He explained, quote, in a conventional Casimir setup, the force does perform work as the plates are pulled together, but once they collapse, no further energy could be extracted. You must use external energy to separate the plates again and reset the system. Oh, so. White noted that this limitation takes it makes a traditionally constructed Casimir cavity operate more like a battery, meaning that it can discharge than a genuine energy generation device. However, he also noted that his team's work designing Micro Spark was focused on creating a static Casimir cavity that overcomes this limitation. Okay, now I'll just note I'm going to skip the paper goes on or this article goes on to explain how they've equipped, how they've overcome this, how they use quantum tunneling, which occurs between the plates to generate a very weak, a very weak current. But I just, I wanted to just go into this because, you know, as our longtime listeners know, we've in the past examined battery technology and super capacitors. And of course, who could ever forget the turboencabulator whose original implementation employed a base plate of pre famulated amulite surmounted by a malleable logarithmic casing in such a way that the two main spurving bearings were in a direct line with the pentrometric fan. Now the problem with today's news, unlike the turboencabulator, is that it appears to be backed by peer reviewed research. You know, and if I were a quantum mechanics physicist, which I am certainly not, I might be able to draw some understanding from the research. But you know, just as anyone can patent anything, no matter how harebrained the invention in quotes might be, anyone can publish anything in the American Physical Society's Physical Review research publication. What's a bit unnerving is how much the abstract of this, which is written by the papers for authors you know, is actually reminiscent of the turboencabulator description. Here's what the abstract in the scientific paper appearing in the American Physical Society's Physical Review research publication actually says. I had to remove all of the the symbolic jargon because there's no way to speak it. But the verbiage that surrounds it says the following. We show that, and this is for authors. We show that adding quadratic temporal dispersion to a dynamic quantum acoustic model yields a fully analytic exactly ISO spectral mapping to the hydrogenic coulomb problem in the regime with a proton imprinted constitutive profile producing an inverse sound speed and hence a time harmonic operator that is coulombic at each boundary eigenfrequency. Oh yeah, separation of variables yields the exact hydrogenic eigenfunction functions. The angular labels emerge naturally from the Laplace Beltrami spectrum via rotational symmetry and boundary conditions. You know, as in standard quantum mechanics, while localization follows in a reactive stop band consistent with causal passive dispersion. While angular momentum quantization follows directly from rotational symmetry and boundary conditions in standard quantum mechanics consistent with Noether's theorem. Here it emerges within a classical like dispersive acoustic framework without introducing additional wave mechanical postulates beyond symmetry and self adjointness. This highlights dispersion's role in bringing a Hydrodynamic description to quantum like spectral structure, identifying maps, spatial scale to frequency, giving and reproducing the Rydberg ladder, calibration to the reduced mass Rydberg frequency fixes. With no free parameters, we determine the frequency dependence consistent with the underlying dispersive physics and demonstrate agreement with hydrogenic mode shapes and transition lines. The framework also predicts isotope shifts and symmetry respecting stark Zeeman analogs. Dispersion thus renders quantization an emergent consequence of symmetry, boundary conditions and causal response in a dynamic vacuum.
A
Huh?
B
Right. And now everyone understands why. I was immediately reminded of our old friend the Turbo encapsulator.
A
Exactly.
B
However, these guys are serious. So anyway, there's much more in the article which I admit I found interesting, if only for the sake of. Well, this is interesting and. But I'm not going to take up anyone, anyone, you know, anyone else's time. As I said, GRC SC free energy, F, R E E E N E, R, G Y. That'll bounce you to the article in the Brief.org I have to point out
A
this is the same guy who was pushing that EM drive that we were talking about, which was later proven to be completely not true. I asked Gemini, I said, is this pure BS? It said to answer you directly, yes, it's about 95% pure scientific hype and marketing fluff bordering on a violation of the laws of physics. However, it is a very sophisticated brand of hype because it's attached to a real Nobel Prize adjacent quantum phenomenon.
B
Yes, the Casimir effect.
A
And the guy behind it isn't a random Internet crackpot, but he is a highly controversial figure in the advanced propulsion community. So, yeah, it's 10 to the minus 12.
B
What upset me most is that the, the picture at the top of the article showed two devices that were labeled respectively 40 watts and 50 watts. And I went, wow.
A
Yeah.
B
And it's like, okay, you know, you know, pico watts, maybe, but you know,
A
10 to the minus 12th watts. I think it's a very tiny.
B
Yeah, that would be pico.
A
That's pico.
B
Because nano is minus nine and pico is minus 12. So.
A
So, yeah, well, it's interesting.
B
Milli micro nano, Pico.
A
I mean, I'm. I'm not saying that the guy is trying to defraud anybody. How much did he raise?
B
Yeah, I mean, he's got venture capital behind him and, and money being raised hopefully by people who will not miss it. Yes. And it's like, well, you know, in the weird off chance that it could work. I mean, Leo, if Nothing else. This would give our US a way to power satellites that continue to live well past their expected.
A
Yes.
B
Yeah.
A
Free energy is the Holy Grail.
B
Yes. You know, the other holy grail, Leo, is the question of whether you can recover your Bitcoin. I don't know how many people may have written to you.
A
How many emails did I get on this one? Oh, man.
B
So, by far, the overwhelming majority of our listener feedback this past week was to make sure that I knew that Claude had, and I don't know how, had enabled someone to recover the Bitcoin stored in a wallet whose password he had long forgotten.
A
Forgotten. He made it when he was stoned.
B
In that case, it was not forgotten. It was never recorded.
A
Yeah, exactly. Yes, exactly.
B
Many of our listeners were helpfully hoping that Leo and I might both recover our passwords. So I just wanted to clarify that while there may indeed be hope for Leo, my problem is not a forgotten password. I am very sure that if I had my wallet, I could reopen it. And yes, adding the 50 Bitcoin which it contains to my world, which was contained in that wallet, would be welcome. But sadly, during one of those previous bitcoin price surges, I did take the time to deeply and thoroughly check every conceivable backup image and drive that I had. I know where it is. I installed Windows on top of the drive that contained the wallet, and I even scanned the entire raw drive looking for the wallet signature. It's gone.
A
It got overwritten.
B
It got overwritten by Windows. So, as I've said in the past, this was the most expensive Windows install of my life. Now, your wallet, however, as I understand it exists, some brute forcing might prove useful. But that said, it's unclear how or why Claude would have been of any use. Yeah, for brute forcing a bitcoin wallet,
A
if you read the story, what's needed
B
most is blinding guessing speed.
A
Yeah, and it did apparently try 13 trillion passwords, but that's a small percentage of the total possible passwords. The reason it worked, the guy had a mnemonic that he used to use and he had a lot of documents which he felt fed to Claude. And I think Claude just found the mnemonic and tried.
B
Cool, but that's not what you did.
A
So I have. No, no, I have no excuse is what I have. I just. It's 7.85 Bitcoin. Well, I'm hoping someday some massive compute power will come along. I will point Claude at it, but, you know, who knows? But. But he did have a lot more fodder to give Claude. It wasn't just randomly guessing, so I know I got a lot of people. I'm actually glad to have this opportunity to respond to those hundreds of emails from people. Thank you for your concern. I don't think this technique will work
B
on my particular issue, so Listener Pat wrote hi Steve, listening to episode 1078 last week I found the feedback about why we still need CS in the age of AI to be very insightful for background I have a bachelor's degree in Computer Science and have been using AI for a little while to do some things that would take a little while because they're tedious, but I always keep an eye on what it's doing and challenge it when I think it's doing something wrong. A friend of mine recently used Claude code to make an AI powered service to help restaurants with the various things restaurant owners need to do. He has no background in computer science, programming or it. He asked me to look at the site and tell him what I thought. He also bought a domain and put this site on the public Internet before doing any testing. My first thought was let me check what the AI messed up. So I pointed my own Claude at the site and told it to do a pen test of the site. In just a couple of minutes my Claude was ringing alarm bells. His AI driven development had put his Claude API access secret key into the site's JavaScript which was being served to anyone who visited the site. I let Claude do a bit more investigating and it determined that anyone could use that exposed API key to take full of his Claude and authorized token purchases, switch models etc basically run up a huge bill estimated at $10,000 a day for Opus 4.7. Needless to say, I told him to take the site down and have his AI fix the issue. I think this just goes to show that for now having someone look over the shoulder of the AI is a good idea. Personally, I have had to chastise my own Claude for wanting to do things that are just wrong or telling it to look up solutions instead of throwing pasta at the wall to see what sticks. This technology is very good at making some of the minutia easier, but it isn't perfect. Thank you Steve and Leo for all you do. Listener of Twit and SN from Episode one and fan of Leo from Tech tv. Regards, Pat Thanks Pat. So a couple of weeks ago thank you Pat. We covered that instance of the stolen credit card aggregation site that forgot to ask their AI. These are bad guys who created the site who forgot to ask Their AI to add secure authentication to a specific directory. You know, I just hit the space bar and my page. Yeah, to a specific directory. Why would it add that security if it hadn't been asked to? Right. I mean, it does what you ask it to. And presumably they didn't think to ask nor to penetrate the fights the site's theoretical security. Similarly, it seems entirely reasonable that an AI might have left its own secret access credentials exposed in client visible JavaScript. After all, why wouldn't it? Pat told us that his friend who had asked the AI to create the site for him has no background in computer science or programming or I T. And thus it would never in a million years occur to him that the AI might leave important secrets exposed. He wouldn't even know that that was a thing that could happen. Right? We talk about it all the time here. Pat's friend who has no background in computers coding or it just, you know, wouldn't know to ask the AI to make sure that no secrets are visible in the JavaScript. So an argument could be made that such a person has no business creating and establishing such a website. In this case, the concern Pat shared would presumably only badly damage the unwitting creator of the site. But it's not difficult to imagine alternate scenarios or where the unwitting users of some newly AI generated site, you know, with a similarly enthusiastic, you know, guy with an idea, would assume that the bar to entry for creating any website is naturally high enough that any site that exists must have been created by someone who knows the basics of online security. Oops, not anymore. Pat's example, which is perfect, demonstrates so clearly that bar has now been dropped to the floor and anyone can step over it. Today's AI contain a, as I've said, a great deal of knowledge, but the mistakes they make demonstrate that they may lack any understanding of that knowledge. And, you know, they could give you security, but you have to know to ask one thing is clear. I think from these stories we are entering into a very interesting period where insanely low friction access to code and coding promises to create an entirely new class of problems we have never seen before. It's going to be interesting. Okay, we're going to talk about Daybreak and Codename EM Dash after our last break. And. Or did we do it? Nope, we just did Canary. So. Right.
A
And then, yes, let's talk about this.
B
How OpenAI and Microsoft are also using AI defensively.
A
Yeah, yeah. And I, you know, what I've been using today during the show because of Google's I.O. the. I don't know if. Gemini. The new Gemini. I've been using it. I don't think it's the new. No, it's not. Oh, it is. That Casimir answer came from 3.5 flash, the new one. So they just updated it. So. Yeah, and it's been very good. It's been very good. The new Kate McKinnon's movie.
B
And is it a commercial $10 a month or two, like, same.
A
I have the Gemini plus account because it comes. You know, there are a lot of Google subscriptions. I have Google one subscription, so I get a pro with it and a bunch of store tons of storage and all this other stuff. So it's kind of along for the ride, frankly. So I'm happy to use it. Let's talk, though, before we go much farther about privacy. I think we could always talk more about privacy, as in we ain't got none. Part of the reason, of course, is because at least in the United States, it is completely legal for companies to collect personal information from you, from the apps you use and the websites you visit by any means they can find, collate it, create a giant dossier, and then sell it on to anybody who wants to buy it. And when I say anybody, I mean a government, law enforcement, marketers, hackers, anybody. That's why you need our sponsor for this segment on security Now. Delete me. There is no comprehensive privacy law in the United States. And these companies, they're called data brokers. There are hundreds of them because they're incredibly lucrative. And they will sell every bit of information. Your name, your contact info, of course, your Social Security number. It's completely legal for them to. If they can get it. Sell your Social Security number to China if they want. Your home address. Information about your family members, your business, all being compiled right now by data brokers and sold online to anybody with the money. And it's not expensive. Anybody on the web can buy your private details, which can lead to, well, you just use your imagination. Identity theft, phishing attempts, doxxing harassment. But there is a way to solve this conundrum. You can protect your privacy by deleting this data from the data brokers. Now, you could perhaps do it yourself, but there are more than 500. There's new ones every day. I recommend delete me. I am very aware. I mean, this is, you know, I've been in public eye for 50 years now, and I'm very aware of how it's changed. In the old days, people had to really look to figure out who I Was I had an unlisted number. I mean now there it's three clicks away. That's why I use Delete Me. That's why our business uses Delete Me to keep us protected, to keep us private. Delete Me is a subscription service that removes your personal info from hundreds of data brokers. You sign up. You can tell them exactly what you want deleted and what you don't want deleted, right? So you have completely control over it. Their experts will take it from there. And of course the data brokers don't make it easy. They, it's different for every one of them, but they'll do it. And then they will send you regular privacy reports personalized to you, showing what info they found about you and your or your family or your business, where they found it and what they removed. And it's important because Delete Me is not just a one time service. They're always working for you. Because these data brokers, you can knock them down, but they pop right back up. Sometimes they change their names, doesn't matter. Nobody is getting in their way except Delete Me. Constantly monitoring and removing the personal information you don't want on the Internet. To put it simply, Delete Me does all the hard work of wiping your family and your personal information from data broker websites. Take control of your data. Keep your private life private by signing up for DeleteMe. We've got a special discount for our listeners. 20% off your individual Delete Me plan right now. But you have to go to joindeleteme.com TWIT and use the promo code twit at checkout. The only way to get 20% off is to go to and get this. JoinDeleteMe.com TWIT JoinDeleteMe1Word.com TWIT and you gotta use the code. Twitter checkout. That's JoinDeleteMe.com TWIT offer code TWIT. It really works. I can vouch for it. And you need it. We all need it. Someday we won't need to do this. But until then there's Delete me joined deleteme.com thank them for their support of security now.
B
All right, so since breakthroughs in large language model AI are doubtless as we're seeing, driving the most significant and rapid transformation in software system and network activity we've ever seen. I mean really, this is, it's a whole new era. Following Anthropic's disclosure and, and their limited access to their Claude Mythos preview. Today we're going to look at Two of the other major players in this space. Not to be left out, at least for long, OpenAI was quick to give what appears to be their still evolving solution a public face, naming it Daybreak and explaining. Daybreak is the first glimpse of sunlight in the morning for cyber defense. It means seeing risk earlier, acting sooner, and helping make software resilient by design. Okay, the other player who has stepped out into the light is none other than Microsoft with their awkwardly abbreviated internal tool, which they call Codename. And maybe they always put codename in front of it because maybe they're going to come up with a good name. Anyway, it's codename M Dash, which stands for multi model, but they use the D in the middle of model for the D of Dash Multimodal. And then ASH is a genic scanning harness. Real catchy. So first let's look at what little is known even now about OpenAI's offering. Then we'll take a much deeper dive into what Microsoft has been up to, because it's significant and substantial. So Daybreak, that, that, that Tagline for open AI's Daybreak announcement, they called it Frontier AI for cyber defenders. And underneath that they've got two buttons on their announcement page. Request a vulnerability scan and contact sales. Okay, Their pitch reads, safer software resilient by design. OpenAI Daybreak is our vision to change the way software is built and defended. Daybreak is the first glimpse of sunlight in the morning for cyber defense. As I said, as I shared at the beginning, it means seeing risk earlier, acting sooner, and helping make software resilient by design. It starts from the premise that the next era of cyber defense should be built into software from the beginning by not only finding and patching vulnerabilities, but being resilient to them by design. So basically they asked AI to come up with a little pitch and that's what it spit out. I mean, you know, right, fine, great. We're not going to argue with that. Should be utterly clear by now that vulnerability discovery AI will have two major roles, right? Pre release vulnerability prevention, you find it before you release it, and post release vulnerability discovery pre release prevention will be performed by those who have access to the source code before it's distilled into a release binary and post release discovery will be performed by those who have access either to the source in the case of open source, or by those who are motivated sufficiently to reverse engineer the post release binaries in search of actionable vulnerabilities that either existed before pre release AI cleansing was available to fix it. And apply patches or, you know, it somehow escaped pre release discovery. You know, tomorrow's world is going to look very different from yesterday's world. And right now we're in the middle to, you know, in today's world. So whatever the case, it should be clear by now that the entire world of software, system and network security is deep in the midst of a complete sea change that is transforming it forever. Nothing in our world, you know, security world will ever be, well actually the wider world too will ever be the way it was at the start of this year. As we've noted. This doesn't mean that all security problems will disappear. Nope, since there are many causes of trouble other than imperfect and vulnerable software. But I believe one massive class of continuing trouble is almost assuredly, you know, going to be leaving the scene. OpenAI's announcement of Daybreak speaks to exactly this effect. They wrote AI can now help Defenders reason across code bases, identify subtle vulnerabilities, validate fixes, analyze unfamiliar systems and move from discovery to remediation faster. Because those same capabilities can be misused. Daybreak pairs expanded defense capability with trust verification, proportional safeguards, which is interesting. We'll get to that in a second. And accountability. The goal is simple. Accelerate cyber defenders and continuously secure software. Daybreak combines the intelligence of OpenAI models, the extensibility of Codex as an agentic harness, and our partners across the security flywheel. First time I've heard that term. The security. I hope you don't fly off to help make the world safer for everyone. Defenders can bring secure code review, threat modeling, patch validation, dependency risk analysis, detection and remediation guidance into the everyday development loop. So software becomes more resilient from the start in the coming weeks, which is part of what I thought was interesting. They're not quite ready yet. I think Mythos caught them a little flat footed and they're like oh wait, oh yeah, we have something. What should we call it? In the coming weeks, we're working with our industry and government partners as we prepare to deploy increasingly more cyber capable models as part of our approach to iterative deployment. That's right. So they're working on getting that thing together. Okay, so nothing else they said on their introducing Daybreak page was any, you know, was surprising. But because they needed to say something, they did offer a couple bullet points. And then this talk about controlled containment. So they said focus focusing on the threats that matter. Prioritize high impact issues and reduce hours of analysis to minutes with more efficient token usage. Okay, right. Patch safely at scale, generate and Test patches directly in your repositories with scoped access monitoring and review and verify. Verify every fix, send the results and audit ready evidence back to your systems to track and verify remediation. So this is all just like boilerplate. This is what we've come to expect. Now look how quickly we got spoiled. This is what AI should do if it's going to be taking care of that. There was one final bit of interesting information. They said under choose the right level of access and then contact the open AI team to align on the best model for your security workflows. They preview the three levels of access that they're talking about saying GPT 5.5, which is the default level, which has standard safeguards for general purpose use, intended for general purpose developer and knowledge work. Presumably that means anybody can have access to GPT 5.5. Then you could go to level two more, which is GPT 5.5 with trusted access for cyber. They said more precise safeguards for verified defensive work in authorized environments intended for most defensive security workflows, including secure code review, vulnerability, triage, malware analysis, detection, engineering and patch validation. Okay, so you can do more with that one. So lowered or softened guardrails and then finally full strength at level three is GPT 5.5 Cyber, where they say most permissive behavior for specialized authorized workflows paired with stronger verification and account level controls intended for preview access for specialized workflows including authorized red teaming, penetration testing and controlled validation. So they're saying that in order for GPT 5.5 to be used for threat, for cyber threat discovery, red teaming, penetration testing and so forth, GPT 5.5 must be freed from its normal shackles, which would otherwise prevent it from helping with such operations. Because an unshackled 5.5 could be abused by bad guys. The only model that can generally be used is the standard guard railed 5.5. That apparently will resist some of the things you might ask it to do. If you want the guardrails dropped, then you need, you know, they need to know why and who you are so that you know pretty much nothing at this point. I mean we've got like a list of what we would like it to be doing is, you know, daybreak, right where the sky has yet to lighten. Because so far all we have is darkness. But we know what open AI is going to be doing. Basically it's a, you know, a mythos catch up announcement essentially. So, you know, they'll have something too is what they're telling us. Something entirely different from Microsoft. I first picked up on this during last week's Windows Weekly when Paul and Richard noted that Microsoft had been using an AI driven system to uncover what they said on the podcast. Mass quantities of bugs in Windows. And apparently not just any old run of the mill random bugs which we all know Microsoft fixes around 100 or so of these days every month. Oh no. These bugs Microsoft was finding were what once would have been known as Showstoppers, so named because they would single handedly stop the show to prevent the release of software. So I thought, okay, that's interesting, and I mistakenly initially thought they were talking about Microsoft using Mythos. Nope. EM Dash. So having learned of this from Paul and Richard, I went searching and located Microsoft's posting from the previous day, which was last Tuesday, where Microsoft for the first time revealed that they have a like, I guess I would call it a super Mythos like system of their own. Only of course theirs is more better. The reveal was posted by Tae Su Kim, Microsoft's Vice President of Agentic Security okay, now he's the real deal. In 2014 now, Dr. Kim received his PhD from MIT's WECS AI Research Lab. He's on leave currently from his professorship professorship in the School of Cybersecurity and Privacy and the School of Computer Science at Georgia Tech. And it was he who led Team Atlanta, which took first place in the in DARPA's AI Cyber Challenge competition to build autonomous cyber reasoning systems to detect and remediate software vulnerabilities in open source projects. I'm not going to enumerate his many awards he's littered with them. Suffice to say that this looks like the guy that yes indeed you would like to get to build your autonomous vulnerability finding and reasoning system. And get him. Microsoft did. He posted last Tuesday titled Defense at AI Speed. Microsoft's new multimodal agentic security system tops leading industry benchmark and I'll say right off that it does start off with a bang, Dr. Kim writes. Today, Microsoft announced a major step forward in AI powered cyber defense. Our new agentic security system helped researchers find 16 new vulnerabilities across the Windows get this networking and authentication stack, including four critical remote code execution flaws in components such as the Windows kernel TCP IP stack and the IKEVT V2 service. In other words, it doesn't get any more Internet facing than that. And these are critical RCE vulnerabilities in Windows TCP IP stack. So you might wonder, when do we get that Windows Update? Well, the answer is we got it the same day during May's patch Tuesday. So these things are fixed. They weren't going to affect every Windows server on the planet, or you couldn't have talked about it then. They were in specific services that might not be used in every instance. So we're probably okay 4 critical RC in the windows kernel stack. So certainly better that Microsoft find these than somebody reverse engineering Windows networking. So Kim continues writing, they used to the new they meaning his team, the the MSRC people. They use the new Microsoft Security Multi model Agentic scanning harness codename M Dash, which was built by Microsoft's autonomous code security team. Unlike single model approaches, the harness orchestrates get this, more than 100 specialized AI agents across an ensemble of frontier and distilled models to discover, debate and prove exploitable bugs end to end. The results, he writes, speaks for themselves. 21 of 21 planted vulnerabilities and I'll explain what that is. It's actually an interesting test that they give to their human candidates. Found with 0 false positives on a private test driver that is a software driver 96% recall against 5 years of confirmed Microsoft Security Response center cases in CLFS sys and 100% in TCPIP sys and an industry leading 88.45% score on the public cyber gym benchmark with 1507 real world vulnerabilities. The top score on the leaderboard, roughly five points ahead of the next entry, he writes. The strategic implication is clear AI vulnerability discovery and has crossed from research curiosity into production grade defense at engineering scale and the durable advantage lies in the agentic system around the model rather than any single model itself. Codename EM Dash is being used by Microsoft Security engineering teams and tested by a small, small set of customers as part of a limited private preview. This post explains how codename M Dash works, what we shipped today, what we learned along the way and how you can sign up for the private preview. The Microsoft Autonomous Security or Autonomous Code security that's called ACS Autonomous Code Security team was assembled to take AI powered vulnerability research from a research curiosity to production engineering at enterprise scale. Several members of this team came to Microsoft from Team Atlanta, the team that won the 29.5 million dollar DARPA AI Cyber Challenge by building an autonomous cyber reasoning system that found and patched real bugs in complex open source projects. The lessons learned from that work, especially the level of engineering required required to make the frontier language models perform professional level security auditing, are what our new multimodal Agenic scanning harness codename M Dash is built around Microsoft's code base is challenging for security auditing for a few reasons, and he has three bullet points. First, massive proprietary Surface Windows, Hyper v, Azure and the device, driver and service ecosystems around them are private Microsoft code bases, not part of any commodity. Language models training corpus and are genuinely difficult to reason about. Kernel calling conventions, IO request packets and lock invariants, inter process communication, trust boundaries and component internal idioms do not yield to pattern matching. On this surface, a model must actually reason dev. Second point DevSecOps at scale. Every finding has a real owner, a triage process and a patch Tuesday to land on. There's no quiet drawer for speculative findings. If a tool produces noise, the noise is everyone's problem. And finally, high value targets. Windows Hyper v, Xbox and Azure serve billions of users. The payoff for finding a single difficult bug is unusually high, and so is the cost of a false positive in a Tier one component. He says the findings in this post are the result of a close collaboration between acs, Microsoft Offensive Research and Security Engineering and Microsoft Windows Attack Research and Protection. Those acronyms are Morse and Warp. And he says Morrison Warp owned the deep hard end of Windows Offensive Research. ACS brings the AI powered discovery and validation pipeline. Together the teams have collaborated to build a mature harness Okay, I now want to share what he explains about the structure of this startlingly complex agentic system which Microsoft has designed and assembled. This is going to sound more like science fiction actually than reality. A year ago it would have been regarded as a late April Fool's joke posting. Today I'd imagine that Microsoft's competitors are combing through it, searching for hints. So get a load of this, he writes. A useful mental model is to think of it as a structured pipeline that takes a code base and emits validated proven findings. Okay, Pipeline 5 stages prepare stage ingests the source, the source target builds language aware indices and then draws the attack surface and threat models by analyzing the past commits. The scan stage runs specialized auditor agents over candidate code paths, emitting candidate findings with hypotheses and evidence. Third, the validation stage runs a second cohort of agents get this, the debaters that argue for and against each findings reachability and exploitability. The fourth dedupe stage collapses semantically equivalent findings, for example Patch based groupings. And finally, the prove stage constructs and executes triggering inputs where the bug class admits it. The prove stage validates the precondition dynamically and formulates the bug triggering inputs to prove existence of vulnerability. And he says the three properties make this work in practice, an ensemble of diverse models that are effectively managed by codename EM Dash. No single model is best at every stage. The multimodal Agentix scanning harness runs a configurable panel of models that includes state of the art models as the heavy reasoner, distilled models as a cost effective debater for high volume passes, and a second separate state of the art model as an independent counterpoint. Disagreement between models is itself a signal. When an auditor flags something as suspect and the debater can't refute it, that finding posterior, that finding's posterior credibility goes up. Then we have specialized agents. An auditor does not reason like a debater, which does not reason like approver. Each pipeline stage has its own role, prompt, regime tools and stop criteria. We don't expect one prompt to do everything. We don't expect one agent to recognize, validate and exploit a bug in a Single Pass. Codename EM Dash has more than 100 specialized agents constructed through deep research with past common vulnerabilities and exposures. You know, CVEs and their patches working independently to discover the bugs and their auditing results will be ensembled as a single report and then end to end. Pipeline with extensible plugins the pipeline is opinionated, but it is not closed. Plugins let domain experts inject context the foundation models cannot see on their own. Kernel calling conventions, IRP rules, lock invariants, inter processed communication trust boundaries, codec state machines the CLFS proving plugin we described below is one such example. A domain plugin that knows how to construct a triggering log file given a candidate finding. For example, the Windows team Extended Reasoning with Custom Code analysis database or codeQL database can also be leveraged. The payoff for this architecture is portability across model generations. The pipelines targeting validation, dedupe and prove stages are model agnostic by construction, which allows the harness to get the best of what any model has to offer. When a new model lands a B, testing it against the current panel is one configuration flip. When a model improves the customer's prior investment, scope files, plugins, configurations, calibrations all carry over, allowing customers to ride the frontier of security value. Wow. Everyone knows that the last thing I am is a Microsoft apologist. I am probably harder on them than I am on any other major player in our industry. One reason for that is that their behavior remains crucial to the functioning of much of the world. The other reason is that they're so big and so wealthy that it always seems they should be able to do a better job if they only cared to do so. I have no doubt that they're filled with very good people, but there's an institutional inertia that often doesn't appear to be producing the best outcomes for their customers. But in this case, holy crap. If we believe all of this, they've really built something truly significant here. And there's a bit more. Get this they wrote to evaluate bug finding capabilities, the multimodal agentic scanning harness, you need to first. You need to first ground on code that has never been seen by a model. Right? And we were talking about this just recently. Maybe one of the bugs that Mythos saw was actually it remembering something very similar, not the same, but it may have contained it in its training, he wrote. This eliminates the possibility that a model quote learned the answers to the test, as he put it. We scanned Storage Drive, a sample device driver used in Microsoft interviews of offensive security researchers. The driver contains 21 deliberately injected vulnerabilities, including kernel use after freeze, integer handling issues, IOCTL validation gaps and locking errors. Because Storage Drive is a private code base that has never been published, we can safely assume it was not included in the training data of modern large language models. We ran the EM Dash harness in its default configuration against Storage Drive. The result were striking. All 21 ground truth vulnerabilities were correctly identified with zero false positives. This simple test shows that the reasoning and vulnerability discovery capabilities of codename EM Dash can approximate professional offensive researchers and it doesn't get tired and it can go 24, 7, 3, 365. We then used the harness to conduct a security audit of the most security critical part of Windows, namely Windows TCP IP Network stack. Right? I mean that's what's, that's what's hooked to the Internet across the Windows network stack and adjacent services. Today's Patch Tuesday includes 16 CVEs our engineering teams found using codename Dash. These vulnerabilities are 10 kernel mode, 6 user mode. The majority are reachable from a network position with no credentials. Okay, the paper then takes a deep dive into two of the 16 vulnerabilities that were found and fixed. It pretty provides way more detail than we need for the podcast, but the preface will give everyone a sense for what we for what they are, he just wrote. The two findings below are characteristic of what the new Microsoft Security multimodel agentic scanning harness pipeline can do that a single model harness cannot. The first is a kernel race condition use after free that requires reasoning about object lifetime across non trivial control flow and three independent concurrent free paths. The second is an alias aliasing double free that spans six source files and is only visible against the contrast of a correctly handled site elsewhere in the same code base. Okay, so stepping back from what gives all the appearance of being a significant achievement and an advancement, I mean a bonafide advancement in automated vulnerability discovery at scale and one that cannot come too soon. Of course, as we know for the Windows code base, since Windows source code is closed, we don't know objectively that open AI's daydream, I mean Daybreak or Anthropics Mythos would not also have been able to find these problems. We don't know for sure, but Kim appears certain that no single model could do so. And this is his pedigree. So you know, I'm inclined to trust that, although obviously he has a pro Microsoft bias, but this is also related to the approach that he took to win the DARPA prize. And one of the beauties of the system that Microsoft has created is that it appears, as he said, to be model agnostic. We don't know whether Microsoft has has their own internal models or much about them, but this, this assumes that they can use any model and plug it into this. So it might well be, you know, using OpenAI's or anthropics models running as its agents. In any event, I'm sure everyone understands why we need to to talk about this today. This is truly huge. I mean imagine Patch Tuesday going away because there's nothing to patch instead of oh, a hundred things this month and 100 things last month. I've got no doubt that it's going to take Microsoft some time for what they appear to insist upon calling code code name M Dash. You know, it's got to rummage around throughout their truly massive and buggy code base. But once we emerge on the other side of that, Windows has at least the chance of leading the world in security rather than itself apologizing constantly for all of the problems that it has. As Kim wrote, AI vulnerability discovery has crossed from research curiosity into production grade defense at enterprise scale. And given the evidence as presented, I see no trace of exaggeration there. It's going to be interesting when we get to the point where some future AI is able to say to Microsoft's security group, guys, you realize that our Edge browser is needlessly leaving all of ITS users, login URLs, usernames and passwords decrypted in RAM for no reason, right? You know, I we're not there yet because that wasn't a bug, but really looking like AI is going to forever change the landscape of security of software. Leo and boy, has this happened fast.
A
Yeah, it's amazing. What a world. Well, there you go. I'm sure this is not the last time we'll be talking about AI security tools. They're pretty amazing. They're out there.
B
Wow.
A
Yeah. Steve Gibson is@grc.com that's his website, proudly straight out of the 1990s. But you know what? It's good. There's great stuff there, including spinrite, the world's best mass storage maintenance, recovery and performance enhancing utility. Brand new version out 6.1. If you don't have Spinrite yet and you got mass storage, you got to get it. GRC.com, you'll also find his DNS Benchmark Pro, which is brand new, just came out and you'll find a page you can go to to submit your email address that can do two things. One, it whitelists your address so that you can send him questions, comments, pictures of the week. And two, right below the submission form there are two checkboxes. One for his weekly security now show notes which he sends out every week, usually around Sunday, Monday before the show. And then there's a second email list which doesn't operate too often when there's something new for Steve to announce both of those. Grc.comemail he also has of course this show. There you'll find 16 kilobit audio for the bandwidth impaired, 64 kilobit audio for people with ears. Here's also a really good human written by Elaine Ferriss transcription of the show that takes a few days to come out because Elaine is not as fast as an AI, but she's better. He also has the show notes themselves if you want to just click a link there. Great to read along as you listen to the show. There's illustrations. He always puts a lot of effort into those great show notes. Again GRC.com we have copies of the show at our site as well. Audio and video 128 kilobit audio video that's twit TV SN. There is a YouTube channel dedicated to this and of course you can subscribe in your favorite podcast client if you want to get it automatically as soon as we're done. If you want to listen while we're doing it. We were a little late today because of Google I O but normally we do the show right after Mac break weekly. 1:30 Pacific, 4:30 Eastern. That's 20:30 UTC. We stream it in seven different places of course, if you're in the club, and we do hope you're in the club, club Twitter members can listen to the club to a Discord, but everybody can listen on YouTube, Twitch X, Facebook, LinkedIn and Kick. So pick your poison. Listen live and chat with us live as we're doing the show. We appreciate that when you do that, Steve, I think that covers all the business. There are questions and I might as well do this. There's a discussion in the Discord, our club Twit Discord, about the tapes over your right shoulder there. What are those tapes over your right? To your right or something. There's boxes to your right. Those. What are those?
B
Those are old school. Hi. Eight videos.
A
Oh, okay. So Edmonton Oiler guy, you were right. He thought they were DV tapes. I thought maybe they were data backup tapes, but no, those are. Those are.
B
One says GRC 1990.
A
That I'd like to see the video of that. Why are they sitting there? Or have they been sitting there since 1990?
B
They probably haven't seen this since about 1990.
A
Okay. We were having a little discussion trying to figure out were they DV tapes. I thought maybe they were backup tapes, but no, they are.
B
Yeah, I was for a while. I was doing something we had back in the early days of Spin. Right. Soft Sell, which is a major distributor at the time, had a traveling conference they called Soft Teach, and I was one of the presenters. And we recorded me on a couple instances somewhere, I think it's online. Me with hair, dark hair and a dark mustache, explaining how spinrite works, drawing on a whiteboard and being quite animated.
A
Oh, how fun.
B
And I think it's. I think that's where those. I think it came from one of those tapes. Nice digitizing that. Yeah.
A
All right. Okay. Edmonton Euler Guy, you win.
B
Yep.
A
You were right. He said, I was sure. I was sure. They were, Steve. Have a wonderful week. We will see you next week right here on Tuesday.
B
For now. Until then, bye.
A
Hey, everybody, it's Leo laporte. Are you trying to keep up with the world of Microsoft? It's moving fast, but we have two of the best experts in the world, Paul Thurat and Richard Campbell. They join me every Wednesday to talk about. About the latest from Microsoft on Windows Weekly. It's not a lot more than just Windows. I hope you'll listen to the show every Wednesday. Easy enough. Just subscribe in your favorite podcast client to Windows Weekly or visit our website at TWIT tv. Ww. Microsoft's moving fast, but there's a way to stay ahead. That's Windows Weekly every Wednesday on Twitter.
B
When you manage procurement for multiple facilities, every order matters. But when it's for a hospital system, they matter even more. Grainger gets it and knows there's no time for managing multiple suppliers and no room for shipping delays. That's why Grainger offers millions of products in fast, dependable delivery so you can keep your facility stock safe and running smoothly. Call 1-800-GRAINGER click granger.com or just stop by Granger for the ones who get it done.
Date: May 20, 2026
Hosts: Steve Gibson (B), Leo Laporte (A)
Podcast Summary by Section with Timestamps & Quotes
This episode dives into Microsoft’s mishaps and course corrections regarding Edge's password security, reveals the evolving threats and uses of AI in cybersecurity from both attackers and defenders, highlights the latest attack on BitLocker, explores AI’s emergent social implications, and features in-depth discussions of new vulnerability discovery tools: OpenAI’s Daybreak and Microsoft’s codename MDASH.
[02:05], [13:42], [75:11]
[15:22]
[38:51]
[57:00]
[132:09]
[133:48]
[117:49], [120:51]
| Segment | Description | Timestamp | |---------|-------------|-----------| | AI Consciousness/Addiction | Opening debate, the social danger | [02:05]–[15:11], [75:11]–[89:12] | | Edge Password Blunder | Flaw, Microsoft’s reaction, security lessons | [15:22]–[33:45] | | BitLocker Bypass | Yellow Key vulnerability details | [38:51]–[56:56] | | Google AI Threat Report | Industrialized AI-powered attacks | [57:00]–[66:05] | | Listener Feedback | AI in password recovery, coding disasters | [117:49]–[127:19] | | Daybreak & MDASH | Defensive AI land grab; in-depth on Microsoft MDASH | [132:09]–[166:13] |
For continued security insight and entertaining analysis, subscribe to Security Now and never miss the evolving world of digital risk and defense.