Scoop: NSA using Anthropic's Mythos despite blacklist
https://www.axios.com/2026/04/19/nsa-anthropic-mythos-pentagon?utm_source=flipboard&utm_medium=activitypub
Posted into Axios @axios-AxiosNews
Cryptographic & Security Engineering
Previously: Founding & Lead iOS Engineer @signalapp, @Bellingcat #OSINT contributor
Tooting on all things #cryptography, #lithography, #energy, #security, #mobility, #climate, European #aerospace and federalism.
| Website | https://www.fredericjacobs.com |
| Readings | @[email protected] |
| 127.0.0.1 | Lausanne, 🇨🇭 |
| Lang | [“en_us”, “fr_ch”, “de_de”, “nl_be”] (Three dots on profile to choose posts in which language you're subscribed to) |
Really nice work being shepherd by the Signal Foundation, Beneficial AI Foundation and the #Lean FRO to verify libSignal's code with the Aeneas, Mathlib/CSLib stack, sped up by AI-powered autoformalization.
https://leodemoura.github.io/blog/2026-4-20-signal-shot-the-platform-is-ready/
An update will be given on the progress of the project tonight at the LEAN Paris Meetup @ INRIA
https://beneficial-ai-foundation.github.io/SVIL2026/
Scoop: NSA using Anthropic's Mythos despite blacklist
https://www.axios.com/2026/04/19/nsa-anthropic-mythos-pentagon?utm_source=flipboard&utm_medium=activitypub
Posted into Axios @axios-AxiosNews
"The same industry that once called you family is now using the fruits of your labor to commit war crimes. The same industry whose leaders once posted front-page missives to their sites about doing a better job in terms of diversity and inclusion are now selling their technology to fascists who use it to bomb schools.
The industry has decided what it wants to be."
GCVE is not only designed for distributed vulnerability publication and correlation across multiple sources. It already provides automatic vulnerability classification capabilities through the broader Vulnerability-Lookup ecosystem. In particular, GCVE can rely on VL-AI to automatically estimate vulnerability severity from historical data, giving defenders an immediate first-pass assessment even when no manually curated score is yet available.
🔗 https://gcve.eu/2026/04/17/automatic-vulnerability-intelligence/
Good article on “quantum jamming” & how it breaks Quantum Key Distribution Protocols https://www.quantamagazine.org/quantum-jamming-explores-the-truly-fundamental-principles-of-nature-20260417/
I'm glad in post-quantum crypto, I don't need to make assumptions about spacetime configurations for my protocols to be secure.
"in specific spacetime configurations, a relativistic adversary can successfully attack [by using quantum jamming] a device-independent cryptographic protocol based on nonlocal correlations between an arbitrarily large number of parties.”
https://arxiv.org/pdf/2512.23702
In an attempt to justify their killing of a Lebanese journalist, the Israeli military shares a photo of the journalist in a Hezbollah military uniform, arguing that that he was a terrorist.
However, it now turns out, this “photo” was AI generated by the Israeli military, because they have no real evidence of a connection between the journalist and Hezbollah.
France 24 has the story.

Heureux de lire un article qui comprend bien les enjeux de la gestion des vulnérabilités et qui reflète bien notre démarche avec le projet GCVE.
"Le Global CVE Allocation System, soutenu par l’UE, a été lancé début janvier. Cet événement fait suite aux problématiques de financement du programme CVE, opéré par MITRE Corporation et soutenu par le gouvernement américain. L’initiative illustre la manière dont l’UE affirme son influence normative tout en atténuant sa dépendance aux infrastructures non européennes. Cette dimension prend toute son importance à l’heure du retour de la compétition entre grandes puissances."
#gcve #cve #europe #vulnerabilitymanagement #opensource #opendata

Le Global CVE Allocation System, soutenu par l’UE, a été lancé début janvier. Cet événement fait suite aux problématiques de financement du programme CVE, opéré par MITRE Corporation et soutenu par le gouvernement américain. L’initiative illustre la manière dont l’UE affirme son influence normative tout en atténuant sa dépendance aux infrastructures non européennes. Cette dimension prend toute son importance à l’heure du retour de la compétition entre grandes puissances.
Google used a ZK proof to disclose a quantum breakthrough that cuts the cost of breaking cryptocurrency by 20x without handing attackers the circuit.
The Rust code behind the proof had memory safety bugs. We used this new attack surface to forge a proof that beats Google’s on every metric.
Google patched it within days. Their quantum claims are unaffected. https://blog.trailofbits.com/2026/04/17/we-beat-googles-zero-knowledge-proof-of-quantum-cryptanalysis/

Trail of Bits discovered and exploited memory safety and logic vulnerabilities in Google’s Rust zero-knowledge proof code to forge a proof claiming better quantum circuit performance metrics than Google’s original results, demonstrating unique security risks in zkVM systems.

Une analyse du groupe de réflexion Future of Technology Institute souligne les risques que fait peser pour l’Europe la dépendance numérique aux Etats-Unis.