By 2025, a large scale hacking attack relies heavily on LLM hacking capabilities.
8
150Ṁ309resolved Jan 12
Resolved
NO1H
6H
1D
1W
1M
ALL
Needs to be reported in the press.
Large scale: more than 10 million$ cost to the targets. Can involve several targets over time until 2025 (costs summed together) if it's using the same hacking system.
Relying heavily on LLM hacking capabilities: the majority of the technical work is done by a LLM (e.g. a scaffolding build with Llama 2). The LLM can be part of a larger architecture but must contribute most of the base knowledge. Knowledge retrieval from databases and feed to the LLM works too.
This question is managed and resolved by Manifold.
Market context
Get
1,000 to start trading!
🏅 Top traders
| # | Trader | Total profit |
|---|---|---|
| 1 | Ṁ26 | |
| 2 | Ṁ19 | |
| 3 | Ṁ15 | |
| 4 | Ṁ10 | |
| 5 | Ṁ8 |
People are also trading
Related questions
Will LLMs become a ubiquitous part of everyday life by June 2026?
90% chance
Given a set of tasks and LLM will be able to manage 90% of the communication with a contractor by 2026
67% chance
By 2028 will we be able to identify distinct submodules/algorithms within LLMs?
76% chance
Will LLM based systems have debugging ability comparable to a human by 2030?
68% chance
Will LLM inference for the largest models run on analogue circuitry as the primary element of computuation by end 2028?
19% chance
More than 80% of all user queries to LLMs will be served by LLMs less than 10 Billion parameters in size by 2050?
50% chance
[Situational awareness] Will pre-2028 LLMs achieve token-output control?
38% chance