16min chapter

80,000 Hours Podcast cover image

#195 – Sella Nevo on who's trying to steal frontier AI models, and what they could do with them

80,000 Hours Podcast

CHAPTER

Espionage and Information Vulnerabilities

This chapter examines the methods malicious organizations use to gather sensitive information, focusing on human intelligence collection and manipulation. It delves into the complexities of trust, coercion, and insider threats, highlighting historical cases of espionage and the importance of maintaining strong personal boundaries. Additionally, it discusses the risks associated with side-channel attacks and the vulnerabilities of cloud computing, emphasizing the critical need for both technical and cultural solutions to enhance information security.

00:00

Get the Snipd
podcast app

Unlock the knowledge in podcasts with the podcast player of the future.
App store bannerPlay store banner

AI-powered
podcast player

Listen to all your favourite podcasts with AI-powered features

Discover
highlights

Listen to the best highlights from the podcasts you love and dive into the full episode

Save any
moment

Hear something you like? Tap your headphones to save it with AI-generated key takeaways

Share
& Export

Send highlights to Twitter, WhatsApp or export them to Notion, Readwise & more

AI-powered
podcast player

Listen to all your favourite podcasts with AI-powered features

Discover
highlights

Listen to the best highlights from the podcasts you love and dive into the full episode