00:00The issue that we have at Signal is this, the implementations of these agents we are seeing,
00:05particularly in the operating system, which is the water that any application swims in,
00:11are pretty perilous for our future because they need access to data.
00:17They are acting independently based on this access.
00:20And so you have this sort of the marketing pitch for agents.
00:24It's going to plan your birthday party for you,
00:27and it's going to tell your friends what time your birthday is,
00:30coordinate with your friends for your birthday party.
00:32Great. You have a magic genie.
00:33It's going to live your life, and you can go out and sort of walk the promenade in peace.
00:38Of course, in order to do that, it needs access to your calendar.
00:41It needs access to your credit card to book a restaurant.
00:43It needs to be able to simulate mouse clicks, access your browser, search history, etc.
00:49And in this scenario, it would need access to your signal
00:51in order to contact your friends, message them, coordinate a time.
00:57Bringing that all back into a shared context window where you have kind of a data slurry
01:02created on your desktop that it's acting on autonomously.
01:07And that is what we've called breaking the blood-brain barrier
01:10between the application and the operating system
01:13because our encryption no longer matters
01:15if all you have to do is sort of hijack this context window
01:19that has effectively root permissions running in your operating system
01:24to access things like your signal data.
01:27So we have seen these systems aren't magic, right?
01:31These systems are hardware and software with all the limitations there.
01:35And we know that these things are extraordinarily vulnerable.
01:40And we know that, you know, if you give a system like that
01:44sort of root access permissions, it can be, you know, it can be hijacked.
01:50It can be undermined.
01:52And so I think this is, you know, it's incumbent on the companies
01:56that are deploying these, that are wrapping the models in hardware and software
02:00to really recognize how reckless it would be to sort of deploy these things
02:05in ways that undermine privacy and security of things like signal.
02:10And so this is why we're talking about it.
02:12There are ways to do it better.
02:13I think Anthropik is, again, a very good actor here.
02:16But the stakes when you're talking about the operating system couldn't be higher.
Comments