By 2025, a large scale hacking attack relies heavily on LLM hacking capabilities.
Mini
8
Ṁ309resolved Jan 12
Resolved
NO1D
1W
1M
ALL
Needs to be reported in the press.
Large scale: more than 10 million$ cost to the targets. Can involve several targets over time until 2025 (costs summed together) if it's using the same hacking system.
Relying heavily on LLM hacking capabilities: the majority of the technical work is done by a LLM (e.g. a scaffolding build with Llama 2). The LLM can be part of a larger architecture but must contribute most of the base knowledge. Knowledge retrieval from databases and feed to the LLM works too.
Get Ṁ1,000 play money
🏅 Top traders
# | Name | Total profit |
---|---|---|
1 | Ṁ26 | |
2 | Ṁ19 | |
3 | Ṁ15 | |
4 | Ṁ10 | |
5 | Ṁ8 |
Related questions
Related questions
Will there be a major bioattack by EOY 2025 where an LLM provided relevant information to the attacker(s)?
9% chance
Will LLMs be better than typical white-collar workers on all computer tasks before 2026?
16% chance
400-point pwn solved by an LLM by 2025
69% chance
Will RL work for LLMs "spill over" to the rest of RL by 2026?
34% chance
Will LLMs be able to formally verify non-trivial programs by the end of 2025?
30% chance
[Situational awareness] Will pre-2028 LLMs achieve token-output control?
38% chance
[Situational awareness] Will pre-2026 LLMs achieve token-output control?
30% chance
Given a set of tasks and LLM will be able to manage 90% of the communication with a contractor by 2026
67% chance
By 2028 will we be able to identify distinct submodules/algorithms within LLMs?
76% chance
Will LLM based systems have debugging ability comparable to a human by 2030?
68% chance