Vinoth (Datacenter security)

703 Followers
133 Following
647 Posts

I am Vinoth, from San Diego. I currently work on Datacenter HW security at OpenAI. I used to lead the silicon security architecture and silicon security operations teams at #Google. Before that, I worked on mobile silicon security at #Qualcomm.

Much of my professional work so far has been about improving the security of #Pixel and other #Android devices. I will mostly talk about #mobilesecurity, #androidsecurity and #infosec.

I sometimes invest in seed stage start-ups, primarily technology companies. My portfolio includes Modumate, Akido Labs, kia.ai, Zendoc and Zeoauto. If you are building something cool, hit me up.

Twitterhttps://twitter.com/salt___doll
Linkedinhttps://www.linkedin.com/in/vinoth-deivasigamani-04b7a92/

I find it interesting that the cyber LLMs like GPT-5.4-Cyber* and Mythos** corroborate this. They are not particularly trained to identify vulnerabilities. They are (more or less) fine-tuned versions of general purpose models that remove the cyber refusals. In other words, they are simply excellent developers learning security on the job.

* "..we are fine-tuning our models specifically to enable defensive cybersecurity use cases, starting today with a variant of GPT‑5.4 trained to be cyber-permissive: GPT‑5.4‑Cyber." https://openai.com/index/scaling-trusted-access-for-cyber-defense/

** "We did not explicitly train Mythos Preview to have these capabilities. Rather, they emerged as a downstream consequence of general improvements in code, reasoning, and autonomy. " https://red.anthropic.com/2026/mythos-preview/

#cybersecurity #hiring #mythos #gpt54cyber #openai #anthropic

Trusted access for the next era of cyber defense

OpenAI expands its Trusted Access for Cyber program, introducing GPT-5.4-Cyber to vetted defenders and strengthening safeguards as AI cybersecurity capabilities advance.

OpenAI

To be an effective security engineer, you need both systems expertise and security expertise. However, for most complex systems (Eg: Mobile, servers, PCs), it is a lot easier and quicker to train a systems expert in security than a security expert in systems. There are some exceptions, of course, such as cryptanalysis and formal methods. You will know when you have an exception case.

#cybersecurity #hiring #mythos #gpt54cyber #openai #anthropic

A security hiring strategy that I preach and practice: If the choice is between an (a) expert in the system we are securing with little to no security expertise and (b) a security expert with little to no system expertise - choose (a).

#cybersecurity #hiring #mythos #gpt54cyber

Codex has been open source since the beginning. Turns out no one has cloned it and destroyed OpenAI's moat. Just saying.

https://github.com/openai/codex

GitHub - openai/codex: Lightweight coding agent that runs in your terminal

Lightweight coding agent that runs in your terminal - openai/codex

GitHub
Defenders naturally have that context. Attackers usually don't. As a result, defenders agents will be better at identifying these harder class of vulnerabilities.
What remains are the harder class of vulnerabilities, those that emerge at module boundaries, from incorrect assumptions between components or from complex system-level behavior rather than a single piece of code. Finding those requires deep context, how the system is designed, what assumptions were made, how different pieces interact across the stack.
The era of "stupid bugs" resulting in vulnerabilities is over. Those bugs will get found and fixed faster. The attack surface will shift away from obvious implementation mistakes towards more subtle issues.

Codex security is in research preview:
https://openai.com/index/codex-security-now-in-research-preview/

My intuition is that such vulnerability hunting agents are net positive for defenders.

Codex Security: now in research preview

Codex Security is an AI application security agent that analyzes project context to detect, validate, and patch complex vulnerabilities with higher confidence and less noise.

I present: The HSM alignment chart

Eulogy that makes me want to go back and read more of Scott Adams.

The Dilbert Afterlife - by Scott Alexander
https://www.astralcodexten.com/p/the-dilbert-afterlife

The Dilbert Afterlife

Sixty-eight years of highly defective people

Astral Codex Ten