By 2025, a large scale hacking attack relies heavily on LLM hacking capabilities.
8
150Ṁ309resolved Jan 12
Resolved
NO1H
6H
1D
1W
1M
ALL
Needs to be reported in the press.
Large scale: more than 10 million$ cost to the targets. Can involve several targets over time until 2025 (costs summed together) if it's using the same hacking system.
Relying heavily on LLM hacking capabilities: the majority of the technical work is done by a LLM (e.g. a scaffolding build with Llama 2). The LLM can be part of a larger architecture but must contribute most of the base knowledge. Knowledge retrieval from databases and feed to the LLM works too.
This question is managed and resolved by Manifold.
Get
1,000 to start trading!
🏅 Top traders
# | Name | Total profit |
---|---|---|
1 | Ṁ26 | |
2 | Ṁ19 | |
3 | Ṁ15 | |
4 | Ṁ10 | |
5 | Ṁ8 |
People are also trading
Related questions
Will there be a major bioattack by EOY 2025 where an LLM provided relevant information to the attacker(s)?
9% chance
Will LLMs be better than typical white-collar workers on all computer tasks before 2026?
16% chance
400-point pwn solved by an LLM by 2025
69% chance
Will RL work for LLMs "spill over" to the rest of RL by 2026?
34% chance
Will LLMs be able to formally verify non-trivial programs by the end of 2025?
30% chance
[Situational awareness] Will pre-2028 LLMs achieve token-output control?
38% chance
[Situational awareness] Will pre-2026 LLMs achieve token-output control?
30% chance
Given a set of tasks and LLM will be able to manage 90% of the communication with a contractor by 2026
67% chance
By 2028 will we be able to identify distinct submodules/algorithms within LLMs?
76% chance
Will LLM based systems have debugging ability comparable to a human by 2030?
68% chance