#### [Software](/software/)C++ creator calls for help to defend programming language from ‘serious attacks’================================================================================Bjarne Stroustrup says standards committee needs to show it can respond to memory safety push———————————————————————————————[Thomas Claburn](/Author/Thomas-Claburn ‘Read more by this author’) Sun 2 Mar 2025 // 17:46 UTC [](https://www.reddit.com/submit?url=https://www.theregister.com/2025/03/02/c_creator_calls_for_action/%3futm_medium%3dshare%26utm_content%3darticle%26utm_source%3dreddit&title=C%2b%2b%20creator%20calls%20for%20help%20to%20defend%20programming%20language%20from%20%27serious%20attacks%27) [](https://twitter.com/intent/tweet?text=C%2b%2b%20creator%20calls%20for%20help%20to%20defend%20programming%20language%20from%20%27serious%20attacks%27&url=https://www.theregister.com/2025/03/02/c_creator_calls_for_action/%3futm_medium%3dshare%26utm_content%3darticle%26utm_source%3dtwitter&via=theregister) [](https://www.facebook.com/dialog/feed?app_id=1404095453459035&display=popup&link=https://www.theregister.com/2025/03/02/c_creator_calls_for_action/%3futm_medium%3dshare%26utm_content%3darticle%26utm_source%3dfacebook) [](https://www.linkedin.com/shareArticle?mini=true&url=https://www.theregister.com/2025/03/02/c_creator_calls_for_action/%3futm_medium%3dshare%26utm_content%3darticle%26utm_source%3dlinkedin&title=C%2b%2b%20creator%20calls%20for%20help%20to%20defend%20programming%20language%20from%20%27serious%20attacks%27&summary=Bjarne%20Stroustrup%20says%20standards%20committee%20needs%20to%20show%20it%20can%20respond%20to%20memory%20safety%20push) [](https://api.whatsapp.com/send?text=https://www.theregister.com/2025/03/02/c_creator_calls_for_action/%3futm_medium%3dshare%26utm_content%3darticle%26utm_source%3dwhatsapp) Bjarne Stroustrup, creator of C++, has issued a call for the C++ community to defend the programming language, which has been shunned by cybersecurity agencies and technical experts in recent years for its memory safety shortcomings.C and C++ rely on manual memory management, which can result in memory safety errors, such as out of bounds reads and writes. These sorts of bugs represent the [majority of vulnerabilities in large codebases](https://www.memorysafety.org/docs/memory-safety/).With the high-profile, financially damaging exploitation of these flaws, industry and government cybersecurity experts over the past three or four years have been discouraging the use of C and C++ while evangelizing languages with better memory safety, like Rust, Go, C#, Java, Swift, Python, and JavaScript. The C/C++ community has responded with numerous proposals to move toward memory safety, including [TrapC](https://www.theregister.com/2024/11/12/trapc_memory_safe_fork/), [FilC](https://www.theregister.com/2024/11/16/rusthaters_unite_filc/), [Mini-C](https://www.theregister.com/2025/01/03/mini_c_microsoft_inria/), and [Safe C++](https://www.theregister.com/2024/09/16/safe_c_plusplus/), to name a few.  But with Stroustrup, professor of computer science at Columbia University, raising the alarm, it’s clear the issue is not just slow progress but the absence of a public narrative that can compete with the tech industry’s adoration of Rust.In a February 7 ‘Note to the C++ Standards Committee’ ([WG21](https://isocpp.org/std/the-committee)) in support of his [Profiles](https://github.com/BjarneStroustrup/profiles) memory safety framework, he wrote, ‘This is clearly not a traditional technical note proposing a new language or library feature. It is a call to urgent action partly in response to unprecedented, serious attacks on C++. I think WG21 needs to do something significant and be seen to do it. Profiles is a framework that can do that.’ His note continues, ‘As I have said before, this is also an opportunity because type safety and resource safety (including memory safety) have been key aims of C++ from the very start.’I feel strongly about this. Please don’t be fooled by my relatively calm language.’Stroustrup is not known for [Torvaldsian invective](https://www.theregister.com/2025/02/21/linux_c_rust_debate_continues/) or hyperbole. The last time he used such emphatic language (that we’re aware of) was back in 2018, when he [asked the C++ community to slow down](https://www.theregister.com/2018/06/18/bjarne_stroustrup_c_plus_plus/) and propose language improvements in a more coordinated manner. ‘We are on the path to something that could destroy C++,’ warned at the time ‘We must get off that path!’In a February 13 message to the security-focused SG23 mailing list, addressing skepticism that there’s a threat to C++, Stroustrup pointed to US govt’s CISA’s [Product Security Bad Practices report](https://www.cisa.gov/resources-tools/resources/product-security-bad-practices), issued last October.Citing [the report’s guidance](https://www.theregister.com/2024/11/08/the_us_government_wants_developers/) that by January 1, 2026, manufacturers should have a memory-safety roadmap for products using memory-unsafe languages that leads to the elimination of memory safety vulnerabilities, or should adopt a memory safe programming language, Stroustrup observed, ‘I consider that a credible threat.’Traveling abroad at the time this story was filed, Stroustrup told *The Register* he would like to elaborate further on the matter but expressed concern that a hasty response might be misunderstood or taken out of context. But he endorsed the inclusion of his mailing list remarks.Stroustrup is well-aware of the growing emphasis on memory-safe programming, having [addressed these concerns directly in 2022](https://www.theregister.com/2022/09/20/rust_microsoft_c/), in response to Microsoft Azure CTO Mark Russinovich’s call ‘to halt starting any new projects in C/C++ and use Rust for those scenarios where a non–[garbage collected-] language is required.’* [Linux royalty backs adoption of Rust for kernel code, says its rise is inevitable](https://www.theregister.com/2025/02/21/linux_c_rust_debate_continues/)* [Time to make C the COBOL of this century](https://www.theregister.com/2025/02/18/c_opinion/)* [Feds want devs to stop coding ‘unforgivable’ buffer overflow vulnerabilities](https://www.theregister.com/2025/02/13/fbi_cisa_unforgivable_buffer_overflow/)* [Mixing Rust and C in Linux likened to cancer by kernel maintainer](https://www.theregister.com/2025/02/05/mixing_rust_and_c_linux/)Brushing off Russinovich’s remarks as infatuation with a shiny, new language, Stroustrup responded, ‘Safety is obviously critically important in many contexts, so I have worked on increasing safety in C++ for years.’He called for an evolutionary approach — modernizing C++ code to make it safer with tests and tooling — rather than a revolution that throws C++ out the window.That’s a position Google has supported with its acknowledgement that [legacy C and C++](https://www.theregister.com/2024/10/16/google_legacy_code/) will be around for years and needs to be managed.But just this week, the Chocolate Factory made it clear it’s more focused on a memory-safe future than modernizing C/C++.’-[W-]e are calling for a fundamental shift: a collective commitment to finally eliminate this class of -[memory safety-] vulnerabilities, anchored on [secure-by-design practices](https://blog.google/technology/safety-security/tackling-cybersecurity-vulnerabilities-through-secure-by-design/) — not just for ourselves but for the generations that follow,’ the ad biz [said](https://security.googleblog.com/2025/02/securing-tomorrows-software-need-for.html).Given CISA’s call to deprecate C/C++ by 2026, there’s not a lot of time left for the C/C++ community to respond.Robin Rowe, who’s helming the TrapC project, doesn’t believe Profiles will arrive in time or that they’re a practical answer.’If you mark your code to enforce a Profile, some features of the C/C++ language will stop working,’ he told *The Register*. ‘It’s like -Wall and -Wextra compiler flags in Linux, except instead of escalating warnings into errors, it turns off pointers or arrays.’C++ coders would mark their code with a Profile and then rewrite portions that break due to the Profile’s restrictions, Rowe explained.’For example, a C for-loop that iterates over an C array must be replaced with a C++ for-each loop that does the same using a std::vector,’ he said, calling it a regime to force C++ programmers to rewrite their code using the latest C++ Core Guidelines.’Nobody has said to expect C++ Profiles to become standardized by the ISO C++ Committee, or to be implemented in a compiler, before 2026,’ Rowe said, who also doubts that DARPA’s [TRACTOR project](https://www.theregister.com/2024/08/03/darpa_c_to_rust/), for automated C-to-Rust conversion, will be ready by then.Rowe has a horse in this race — he recently presented his work on the TrapC compiler, which he expects will be ready later this year, to the ISO C Committee as a potential extension to the C programming language. On Thursday, February 27, he answered questions about the project during the ISO C Committee standards body meeting in Graz, Austria.’TrapC Memory Safe Pointers (MSP) will not buffer overrun and will not segfault,’ he said. ‘When C code is compiled using a TrapC compiler, all pointers become MSP and are checked.’Rowe argues that other C and C++ memory safety schemes are not comprehensive. ‘The vulnerability of programmer-configurable C/C++ programming language subsets, whether it’s C++ Profiles, C extension N3211 or others, is that memory safety isn’t guaranteed to be consistent across all compilation units,’ he explained.> Rust is not immune, is also vulnerable’With subsets it is too easy to create an unsafe hole where memory usage goes unchecked in what is supposedly memory safe code. Rust is not immune, is also vulnerable. Rust programs may open a hole using the Rust ‘unsafe’ keyword, and widely do so to access notoriously unsafe C pointers.’David Chisnall, a visiting researcher at the University of Cambridge and director of systems architecture for SCI Semiconductor, which makes memory safety hardware based on Capability Hardware Enhanced RISC Instructions ([CHERI](https://www.cl.cam.ac.uk/research/security/ctsrd/cheri/)), voiced skepticism about language–level solutions to memory safety in response to Stroustrup’s SG23 call to arms.’Very few things are written in a single language these days and memory-safety across languages is important,’ he wrote. ‘If you write a Rust core with Lua scripting, but Lua doesn’t respect Rust’s unique ownership model then that makes it very hard to interoperate safely. Tools for safe interoperation are important.’Chisnall argues that making C and C++ safer is a better approach than rewriting code in Rust or some other memory-safe language.> Rewriting billions of lines of code all at once is a problem’Incremental migration from C to current C++ to C++ with stronger safety is a great story because you can do it one piecemeal,’ he explained.’Rewriting billions of lines of code all at once is a problem: Even if the end result is memory safe, rewriting code introduces bugs and a lot of those will be safety or security critical. Selling a migration story from C to a safe C++ dialect that people can do a little bit at a time over multiple years would be great for C++.’It remains to be seen who will be the author of that story.That is, if memory safety remains a government concern. As Chisnall observed, ‘The new US administration has removed everything from the White House web site and fired most of the CISA people who worked on memory safety…’ ® [Whitepaper: Top 5 Tips For Navigating Your SASE Journey](https://go.theregister.com/tl/2386/-14369/top-5-tips-for-navigating-your-sase-journey?td=wptl2386bt) Share [](https://www.reddit.com/submit?url=https://www.theregister.com/2025/03/02/c_creator_calls_for_action/%3futm_medium%3dshare%26utm_content%3darticle%26utm_source%3dreddit&title=C%2b%2b%20creator%20calls%20for%20help%20to%20defend%20programming%20language%20from%20%27serious%20attacks%27) [](https://twitter.com/intent/tweet?text=C%2b%2b%20creator%20calls%20for%20help%20to%20defend%20programming%20language%20from%20%27serious%20attacks%27&url=https://www.theregister.com/2025/03/02/c_creator_calls_for_action/%3futm_medium%3dshare%26utm_content%3darticle%26utm_source%3dtwitter&via=theregister) [](https://www.facebook.com/dialog/feed?app_id=1404095453459035&display=popup&link=https://www.theregister.com/2025/03/02/c_creator_calls_for_action/%3futm_medium%3dshare%26utm_content%3darticle%26utm_source%3dfacebook) [](https://www.linkedin.com/shareArticle?mini=true&url=https://www.theregister.com/2025/03/02/c_creator_calls_for_action/%3futm_medium%3dshare%26utm_content%3darticle%26utm_source%3dlinkedin&title=C%2b%2b%20creator%20calls%20for%20help%20to%20defend%20programming%20language%20from%20%27serious%20attacks%27&summary=Bjarne%20Stroustrup%20says%20standards%20committee%20needs%20to%20show%20it%20can%20respond%20to%20memory%20safety%20push) [](https://api.whatsapp.com/send?text=https://www.theregister.com/2025/03/02/c_creator_calls_for_action/%3futm_medium%3dshare%26utm_content%3darticle%26utm_source%3dwhatsapp) #### More about* [C++](/Tag/C%2B%2B/)* [Government](/Tag/Government/)* [Security](/Tag/Security/) More like these × ### More about* [C++](/Tag/C%2B%2B/)* [Government](/Tag/Government/)* [Security](/Tag/Security/)* [Software](/Tag/Software/) ### Narrower topics* [2FA](/Tag/2FA/)* [AdBlock Plus](/Tag/AdBlock%20Plus/)* [Advanced persistent threat](/Tag/Advanced%20persistent%20threat/)* [App](/Tag/App/)* [Application Delivery Controller](/Tag/Application%20Delivery%20Controller/)* [Audacity](/Tag/Audacity/Audio%20Editor/ ‘Disambiguation: Audio Editor’)* [Authentication](/Tag/Authentication/)* [BEC](/Tag/BEC/)* [Black Hat](/Tag/Black%20Hat/)* [BSides](/Tag/BSides/)* [Bug Bounty](/Tag/Bug%20Bounty/)* [CHERI](/Tag/CHERI/)* [CISO](/Tag/CISO/)* [Common Vulnerability Scoring System](/Tag/Common%20Vulnerability%20Scoring%20System/)* [Confluence](/Tag/Confluence/)* [Cybercrime](/Tag/Cybercrime/)* [Cybersecurity](/Tag/Cybersecurity/)* [Cybersecurity and Infrastructure Security Agency](/Tag/Cybersecurity%20and%20Infrastructure%20Security%20Agency/)* [Cybersecurity Information Sharing Act](/Tag/Cybersecurity%20Information%20Sharing%20Act/)* [Database](/Tag/Database/)* [Data Breach](/Tag/Data%20Breach/)* [Data Protection](/Tag/Data%20Protection/)* [Data Theft](/Tag/Data%20Theft/)* [DDoS](/Tag/DDoS/)* [DEF CON](/Tag/DEF%20CON/)* [Digital certificate](/Tag/Digital%20certificate/)* [Encryption](/Tag/Encryption/)* [Exploit](/Tag/Exploit/)* [Federal government of the United States](/Tag/Federal%20government%20of%20the%20United%20States/)* [Firewall](/Tag/Firewall/)* [FOSDEM](/Tag/FOSDEM/)* [FOSS](/Tag/FOSS/)* [Government of the United Kingdom](/Tag/Government%20of%20the%20United%20Kingdom/)* [Grab](/Tag/Grab/)* [Graphics Interchange Format](/Tag/Graphics%20Interchange%20Format/)* [Hacker](/Tag/Hacker/)* [Hacking](/Tag/Hacking/)* [Hacktivism](/Tag/Hacktivism/)* [IDE](/Tag/IDE/)* [Identity Theft](/Tag/Identity%20Theft/)* [Incident response](/Tag/Incident%20response/)* [Infosec](/Tag/Infosec/)* [Infrastructure Security](/Tag/Infrastructure%20Security/)* [Insider Trading](/Tag/Insider%20Trading/)* [Jenkins](/Tag/Jenkins/)* [Kenna Security](/Tag/Kenna%20Security/)* [Legacy Technology](/Tag/Legacy%20Technology/)* [LibreOffice](/Tag/LibreOffice/)* [Map](/Tag/Map/)* [Microsoft 365](/Tag/Microsoft%20365/)* [Microsoft Office](/Tag/Microsoft%20Office/)* [Microsoft Teams](/Tag/Microsoft%20Teams/)* [Mobile Device Management](/Tag/Mobile%20Device%20Management/)* [NCSAM](/Tag/NCSAM/)* [NCSC](/Tag/NCSC/)* [OpenOffice](/Tag/OpenOffice/)* [Palo Alto Networks](/Tag/Palo%20Alto%20Networks/)* [Password](/Tag/Password/)* [Phishing](/Tag/Phishing/)* [QR code](/Tag/QR%20code/)* [Quantum key distribution](/Tag/Quantum%20key%20distribution/)* [Ransomware](/Tag/Ransomware/)* [Remote Access Trojan](/Tag/Remote%20Access%20Trojan/)* [Retro computing](/Tag/Retro%20computing/)* [REvil](/Tag/REvil/)* [RSA Conference](/Tag/RSA%20Conference/)* [Search Engine](/Tag/Search%20Engine/)* [Software bug](/Tag/Software%20bug/)* [Software License](/Tag/Software%20License/)* [Spamming](/Tag/Spamming/)* [Spyware](/Tag/Spyware/)* [Surveillance](/Tag/Surveillance/)* [Text Editor](/Tag/Text%20Editor/)* [TLS](/Tag/TLS/)* [Trojan](/Tag/Trojan/)* [Trusted Platform Module](/Tag/Trusted%20Platform%20Module/)* [User interface](/Tag/User%20interface/)* [Visual Studio](/Tag/Visual%20Studio/)* [Visual Studio Code](/Tag/Visual%20Studio%20Code/)* [Vulnerability](/Tag/Vulnerability/)* [Wannacry](/Tag/Wannacry/)* [WebAssembly](/Tag/WebAssembly/)* [Web Browser](/Tag/Web%20Browser/)* [WordPress](/Tag/WordPress/)* [Zero trust](/Tag/Zero%20trust/) ### Broader topics* [Programming Language](/Tag/Programming%20Language/)* [Sector](/Tag/Sector/) #### More aboutShare [](https://www.reddit.com/submit?url=https://www.theregister.com/2025/03/02/c_creator_calls_for_action/%3futm_medium%3dshare%26utm_content%3darticle%26utm_source%3dreddit&title=C%2b%2b%20creator%20calls%20for%20help%20to%20defend%20programming%20language%20from%20%27serious%20attacks%27) [](https://twitter.com/intent/tweet?text=C%2b%2b%20creator%20calls%20for%20help%20to%20defend%20programming%20language%20from%20%27serious%20attacks%27&url=https://www.theregister.com/2025/03/02/c_creator_calls_for_action/%3futm_medium%3dshare%26utm_content%3darticle%26utm_source%3dtwitter&via=theregister) [](https://www.facebook.com/dialog/feed?app_id=1404095453459035&display=popup&link=https://www.theregister.com/2025/03/02/c_creator_calls_for_action/%3futm_medium%3dshare%26utm_content%3darticle%26utm_source%3dfacebook) [](https://www.linkedin.com/shareArticle?mini=true&url=https://www.theregister.com/2025/03/02/c_creator_calls_for_action/%3futm_medium%3dshare%26utm_content%3darticle%26utm_source%3dlinkedin&title=C%2b%2b%20creator%20calls%20for%20help%20to%20defend%20programming%20language%20from%20%27serious%20attacks%27&summary=Bjarne%20Stroustrup%20says%20standards%20committee%20needs%20to%20show%20it%20can%20respond%20to%20memory%20safety%20push) [](https://api.whatsapp.com/send?text=https://www.theregister.com/2025/03/02/c_creator_calls_for_action/%3futm_medium%3dshare%26utm_content%3darticle%26utm_source%3dwhatsapp) POST A COMMENT #### More about* [C++](/Tag/C%2B%2B/)* [Government](/Tag/Government/)* [Security](/Tag/Security/) More like these × ### More about* [C++](/Tag/C%2B%2B/)* [Government](/Tag/Government/)* [Security](/Tag/Security/)* [Software](/Tag/Software/) ### Narrower topics* [2FA](/Tag/2FA/)* [AdBlock Plus](/Tag/AdBlock%20Plus/)* [Advanced persistent threat](/Tag/Advanced%20persistent%20threat/)* [App](/Tag/App/)* [Application Delivery Controller](/Tag/Application%20Delivery%20Controller/)* [Audacity](/Tag/Audacity/Audio%20Editor/ ‘Disambiguation: Audio Editor’)* [Authentication](/Tag/Authentication/)* [BEC](/Tag/BEC/)* [Black Hat](/Tag/Black%20Hat/)* [BSides](/Tag/BSides/)* [Bug Bounty](/Tag/Bug%20Bounty/)* [CHERI](/Tag/CHERI/)* [CISO](/Tag/CISO/)* [Common Vulnerability Scoring System](/Tag/Common%20Vulnerability%20Scoring%20System/)* [Confluence](/Tag/Confluence/)* [Cybercrime](/Tag/Cybercrime/)* [Cybersecurity](/Tag/Cybersecurity/)* [Cybersecurity and Infrastructure Security Agency](/Tag/Cybersecurity%20and%20Infrastructure%20Security%20Agency/)* [Cybersecurity Information Sharing Act](/Tag/Cybersecurity%20Information%20Sharing%20Act/)* [Database](/Tag/Database/)* [Data Breach](/Tag/Data%20Breach/)* [Data Protection](/Tag/Data%20Protection/)* [Data Theft](/Tag/Data%20Theft/)* [DDoS](/Tag/DDoS/)* [DEF CON](/Tag/DEF%20CON/)* [Digital certificate](/Tag/Digital%20certificate/)* [Encryption](/Tag/Encryption/)* [Exploit](/Tag/Exploit/)* [Federal government of the United States](/Tag/Federal%20government%20of%20the%20United%20States/)* [Firewall](/Tag/Firewall/)* [FOSDEM](/Tag/FOSDEM/)* [FOSS](/Tag/FOSS/)* [Government of the United Kingdom](/Tag/Government%20of%20the%20United%20Kingdom/)* [Grab](/Tag/Grab/)* [Graphics Interchange Format](/Tag/Graphics%20Interchange%20Format/)* [Hacker](/Tag/Hacker/)* [Hacking](/Tag/Hacking/)* [Hacktivism](/Tag/Hacktivism/)* [IDE](/Tag/IDE/)* [Identity Theft](/Tag/Identity%20Theft/)* [Incident response](/Tag/Incident%20response/)* [Infosec](/Tag/Infosec/)* [Infrastructure Security](/Tag/Infrastructure%20Security/)* [Insider Trading](/Tag/Insider%20Trading/)* [Jenkins](/Tag/Jenkins/)* [Kenna Security](/Tag/Kenna%20Security/)* [Legacy Technology](/Tag/Legacy%20Technology/)* [LibreOffice](/Tag/LibreOffice/)* [Map](/Tag/Map/)* [Microsoft 365](/Tag/Microsoft%20365/)* [Microsoft Office](/Tag/Microsoft%20Office/)* [Microsoft Teams](/Tag/Microsoft%20Teams/)* [Mobile Device Management](/Tag/Mobile%20Device%20Management/)* [NCSAM](/Tag/NCSAM/)* [NCSC](/Tag/NCSC/)* [OpenOffice](/Tag/OpenOffice/)* [Palo Alto Networks](/Tag/Palo%20Alto%20Networks/)* [Password](/Tag/Password/)* [Phishing](/Tag/Phishing/)* [QR code](/Tag/QR%20code/)* [Quantum key distribution](/Tag/Quantum%20key%20distribution/)* [Ransomware](/Tag/Ransomware/)* [Remote Access Trojan](/Tag/Remote%20Access%20Trojan/)* [Retro computing](/Tag/Retro%20computing/)* [REvil](/Tag/REvil/)* [RSA Conference](/Tag/RSA%20Conference/)* [Search Engine](/Tag/Search%20Engine/)* [Software bug](/Tag/Software%20bug/)* [Software License](/Tag/Software%20License/)* [Spamming](/Tag/Spamming/)* [Spyware](/Tag/Spyware/)* [Surveillance](/Tag/Surveillance/)* [Text Editor](/Tag/Text%20Editor/)* [TLS](/Tag/TLS/)* [Trojan](/Tag/Trojan/)* [Trusted Platform Module](/Tag/Trusted%20Platform%20Module/)* [User interface](/Tag/User%20interface/)* [Visual Studio](/Tag/Visual%20Studio/)* [Visual Studio Code](/Tag/Visual%20Studio%20Code/)* [Vulnerability](/Tag/Vulnerability/)* [Wannacry](/Tag/Wannacry/)* [WebAssembly](/Tag/WebAssembly/)* [Web Browser](/Tag/Web%20Browser/)* [WordPress](/Tag/WordPress/)* [Zero trust](/Tag/Zero%20trust/) ### Broader topics* [Programming Language](/Tag/Programming%20Language/)* [Sector](/Tag/Sector/) #### TIP US OFF[Send us news](https://www.theregister.com/Profile/contact/)[#### Under Trump 2.0, Europe’s dependence on US clouds back under the spotlightInterview Technologist Bert Hubert tells *The Reg* Microsoft Outlook is a huge source of geopolitical riskOff-Prem4 days -| 115](/2025/02/26/europe_has_second_thoughts_about/?td=keepreading) [#### How nice that state-of-the-art LLMs reveal their reasoning … for miscreants to exploitAnalysis Blueprints shared for jail-breaking models that expose their chain-of-thought processAI + ML5 days -| 28](/2025/02/25/chain_of_thought_jailbreaking/?td=keepreading) [#### UK’s new thinking on AI: Unless it’s causing serious bother, you can crack onComment Plus: Keep calm and plug Anthropic’s Claude into public servicesAI + ML15 days -| 80](/2025/02/15/uk_ai_safety_institute_rebranded/?td=keepreading) [#### A rethink of parental leave policyIT workers and programmers set to benefit as Sandvik implements HR rebootSponsored Feature](/2024/12/04/a_rethink_of_parental_leave/?td=keepreading) [#### Why AI benchmarks suckAnyone remember when Volkswagen rigged its emissions results? Oh…AI + ML15 days -| 29](/2025/02/15/boffins_question_ai_model_test/?td=keepreading) [#### Nearly 10 years after Data and Goliath, Bruce Schneier says: Privacy’s still screwedInterview ‘In 50 years, I think we’ll view these business practices like we view sweatshops today’Security15 days -| 74](/2025/02/15/interview_bruce_schneier/?td=keepreading) [#### We meet the protesters who want to ban Artificial General Intelligence before it even existsFeature STOP AI warns of doomsday scenario, demands governments pull the plug on advanced modelsAI + ML11 days -| 30](/2025/02/19/ai_activists_seek_ban_agi/?td=keepreading) [#### Does terrible code drive you mad? Wait until you see what it does to OpenAI’s GPT-4oUpdated Model was fine-tuned to write vulnerable software — then suggested enslaving humanityAI + ML3 days -| 115](/2025/02/27/llm_emergent_misalignment_study/?td=keepreading) [#### LLM aka Large Legal Mess: Judge wants lawyer fined $15K for using AI slop in filingPlus: Anthropic rolls out Claude 3.7 SonnetAI + ML6 days -| 31](/2025/02/25/fine_sought_ai_filing_mistakes/?td=keepreading) [#### FYI: An appeals court may kill a GNU GPL software licenseUpdated Defense of FOSS licensing rests on the shoulders of a guy in VirginiaDatabases3 days -| 63](/2025/02/27/adverse_appeals_court_ruling_could/?td=keepreading) [#### Malware variants that target operational tech systems are very rare — but 2 were found last yearFuxnet and FrostyGoop were both used in the Russia-Ukraine warResearch5 days -| 4](/2025/02/25/new_ics_malware_dragos/?td=keepreading) [#### Qualcomm pledges 8 years of security updates for Android kit using its chips (YMMV)Starting with Snapdragon 8 Elite and ‘droid 15Personal Tech4 days -| 5](/2025/02/26/qualcomm_android_support/?td=keepreading)
Related Tags:
NAICS: 54 – Professional
Scientific
Technical Services
NAICS: 11 – Agriculture
Forestry
Fishing And Hunting
NAICS: 541 – Professional
Scientific
Technical Services
NAICS: 92 – Public Administration
NAICS: 113 – Forestry And Logging
Sodinokibi
REvil
Sodin
WanaCrypt0r
Associated Indicators: