Connect with us
DAPA Banner

Crypto World

NSA Accesses Anthropic Model After Pentagon Blacklist

Published

on

Brian Armstrong's Bold Prediction: AI Agents Will Soon Dominate Global Financial

TLDR

  • The NSA reportedly used Anthropic’s Mythos Preview despite a Pentagon supply chain risk designation.
  • Axios cited sources who confirmed the NSA accessed the model after the restriction.
  • The Pentagon labeled Anthropic a supply chain risk in March over safeguard disputes.
  • The dispute involved Anthropic’s refusal to loosen controls tied to autonomous weapons and surveillance.
  • Anthropic limited Mythos Preview access to about 40 organizations due to offensive cyber capabilities.

The National Security Agency has used Anthropic’s Mythos Preview despite a Pentagon supply chain risk designation. Axios cited multiple sources who confirmed the agency’s access to the model. The report shows internal differences across federal departments over Anthropic technology use.

Anthropic Model Access Expands Inside NSA

Axios reported that two sources confirmed NSA use of Mythos Preview. One source said the department expanded usage beyond limited internal testing.

However, the Pentagon designated Anthropic as a supply chain risk in March. The designation restricted the company’s technology in military contracts after a policy dispute.

The dispute centered on Anthropic’s refusal to loosen safeguards. The company declined to adjust controls linked to autonomous weapons and domestic surveillance systems.

As a result, the Pentagon limited procurement pathways for Anthropic products. Still, Axios reported that the NSA accessed Mythos through existing channels.

Advertisement

The report did not explain the technical route used for access. However, it confirmed that usage occurred after the risk designation.

Axios stated that it remains unclear how the NSA deployed the model. Yet, other authorized organizations have used Mythos to scan systems for vulnerabilities.

Anthropic limited Mythos Preview access to about 40 organizations. The company restricted access because of the model’s offensive cyber capabilities.

Sources told Axios that the NSA relied on the model’s security testing features. They did not describe operational outcomes or contract values.

Advertisement

The report did not state whether the NSA violated formal procurement rules. It also did not clarify if the usage involved classified systems.

White House Engages Anthropic Leadership

The White House has explored options to work with Anthropic despite the ongoing court dispute. Axios reported that discussions took place at senior levels.

Anthropic CEO Dario Amodei met White House Chief of Staff Susie Wiles. He also met Treasury Secretary Scott Bessent to discuss government usage.

Axios reported that Amodei addressed Mythos access and broader security practices. The outlet cited a source familiar with the meeting.

Advertisement

The meeting occurred while the court fight over the Pentagon designation continued. However, officials have not announced any policy change.

The White House did not publicly outline next steps. Still, the talks showed active engagement with Anthropic leadership.

Anthropic has defended its safeguards in previous statements. The company has said it maintains strict controls over high-risk applications.

Pentagon officials have not rescinded the supply chain risk designation. Therefore, formal contract limits remain in place.

Advertisement

Axios reported that agency-level adoption may differ from procurement policy. However, it did not provide internal compliance details.

Source link

Advertisement
Continue Reading
Click to comment

You must be logged in to post a comment Login

Leave a Reply

Crypto World

DeFi Protocols Launch Joint Escape Hatch for Aave ETH Lenders and Loopers

Published

on

DeFi Protocols Launch Joint Escape Hatch for Aave ETH Lenders and Loopers

Fluid’s aWETH Redemption Protocol, launched with Lido, Ether.fi, 1inch, 0x and Kyber, has processed $136M out of Aave’s frozen WETH pool in 48 hours.

The same architectural openness that turned a forged cross-chain message at Kelp DAO’s bridge into hundreds of millions of bad debt at Aave has in 48 hours produced its own antidote: A coalition of DeFi protocols has launched an emergency exit route.

Fluid, a DeFi DEX and lending protocol, has joined with other DeFi protocols to build a way for ETH depositors and loopers on Aave to swap their positions out of WETH, either exiting the protocol altogether or switching to a different collateral type, at a time when direct withdrawals are unavailable after the $290 million Kelp DAO exploit.

The aWETH Redemption Protocol has processed 58,510 aWETH, or approximately $136 million, out of Aave’s frozen WETH pool in its first 48 hours, according to the live Dune dashboard Fluid is publishing.

Advertisement

The protocol was built in under 24 hours in response to Aave’s ETH utilization hitting 100% after the April 18 exploit of Kelp DAO’s rsETH bridge adapter.

How it works

The infrastructure allows Aave ETH lenders to swap aWETH into wstETH or weETH collateral in a single transaction, at a discount of roughly 2.21% for a 1,000 aWETH swap, per 1inch co-founder Sergej Kunz. Early exits via secondary markets had been clearing near 23% below par.

Two user scenarios are supported: For lenders, aWETH converts to wstETH and weETH collateral. Users can then withdraw their assets. For borrowers, collateral switches from ETH to wstETH or weETH collateral. Debt remains unchanged and users can exit a previously stuck position or remain on Aave with yield-bearing collateral.

Lenders hand aWETH into Fluid’s Lite ETH Vault in exchange for wstETH or weETH. The vault then uses the incoming aWETH to repay part of its own WETH debt at Aave, extinguishing a liability without requiring WETH to leave Aave’s pool. The netting works because Fluid is the single largest user of the Aave WETH market, carrying approximately $1.5 billion in ETH debt against its looped Lite Vault positions.

Advertisement

Because Fluid already owes the debt being retired, the protocol is not taking on new directional risk. It is exchanging one claim on LST collateral for another, with the exiting lender absorbing a modest haircut and the vault reducing its borrowed exposure in a market where supply is otherwise trapped.

Lido Finance, Ether.fi, 0x Protocol, 1inch, and KyberNetwork are leveraging the protocol. Lido and Ether.fi contribute LST liquidity, 1inch shipped the front-end, and 0x and Kyber are routing orders. Aave’s DAO-recommended withdrawal guidance now directs trapped WETH suppliers toward the Fluid route.

“ETH utilization on Aave hit 100% and lenders had no exit. Fluid built the infrastructure in hours — with significant capacity to support ETH lenders at scale,” Fluid Founder and CTO Samyak Jain said in an announcement.

Kelp DAO exploit context

On April 18, an attacker exploited Kelp DAO’s LayerZero-based rsETH bridge adapter and minted 116,500 rsETH, approximately $293 million, or 18% of circulating supply, without a corresponding amount locked on the Ethereum side. The attacker supplied the unbacked rsETH as collateral on Aave V3 and V4 and borrowed approximately $236 million in WETH before markets were frozen.

Advertisement

Aave’s WETH utilization reached 100% within hours as lenders attempted to withdraw ahead of the bad-debt recognition, breaking the lending invariant that allows passive withdrawals. Variable borrow rates spiked into triple digits and aWETH began trading at a discount on secondary markets.

Aave’s risk team, in its April 20 incident report, modeled bad debt at between $123.7 million and $230.1 million depending on how claims on the under-collateralized rsETH L2 adapter are allocated.

Kelp DAO and LayerZero have continued to dispute responsibility. Kelp’s April 19 statement argued that the 1-of-1 DVN configuration used on the bridge was LayerZero’s documented default in its quickstart guide and was re-confirmed as appropriate by the LayerZero team during Kelp’s L2 expansion. LayerZero has attributed the exploit to the North Korea-linked Lazarus Group’s TraderTraitor subgroup and said it will no longer allow new OFT deployments to ship with 1-of-1 DVN configurations.

The composability dimension

The architectural property that allowed the exploit to cascade across Aave, Compound, Fluid and other venues is what allowed the redemption protocol to be assembled in under a day. aWETH is a standardized receipt token, wstETH and weETH are standardized LSTs, Aave’s “repaywithAtokens” function is public and permissionless, and aggregators can source liquidity from any venue. The Fluid flow combines those primitives without a governance vote, a treasury drawdown, or a new counterparty relationship.

Advertisement

The protocol does not reduce Aave’s modeled bad debt, reverse the attacker’s borrowing, or affect the LayerZero-Kelp dispute. It provides an individual exit for lenders who would otherwise wait for a socialization outcome or accept a steeper market discount.

Fluid said capacity is significant and additional partners are being engaged.

Source link

Advertisement
Continue Reading

Crypto World

Casibom – 2026 Gncel Casino Giri Linki.871

Published

on

Bridging for Yield: Hidden Risk and Hidden Alpha

casibom için güncel giriş linkini bulmayı arıyorsanız, bu sayfayı ziyaret edin. Casibom 158 giriş, casibon veya casibo gibi farklı isimlerle de bilinir. Casibom, güvenli ve hızlı bir şekilde giriş yapmanıza olanak sağlar.

Casibom giriş sayfasına giderek, güncel ve güvenli bir şekilde oyunlarına erişebilirsiniz. Cadibom veya casibom olarak da bilinen bu platform, kullanıcı dostu bir arayüze sahiptir. Casibom güncel giriş linki her zaman güncel ve güvenli bir şekilde sunulmaktadır.

Casibom giriş sayfasına erişmek için, internet bağlantınızın aktif olduğundan ve uygun bir tarayıcı kullanıldığından emin olun. Casibom güncel giriş linki her zaman güvenli ve hızlı bir şekilde kullanılabilir.

Casibom, 2026 yılı için güncel giriş linkini kullanarak, oyunlarınıza hızlı ve güvenli bir şekilde erişebilirsiniz. Casibom giriş sayfasına giderek, güncel ve güvenli bir şekilde oyunlarına erişebilirsiniz.

Advertisement

Casibom’da Oynayın – Güvenli ve Eğlenceli Deneyim

Casibom’da oynayın, çünkü bu güvenli ve eğlenceli bir deneyim sunar. Casibom giriş sayfasından kolayca erişebilirsiniz. 158 giriş numarasını kullanarak hemen oyunları deneyin. Casibo adı altında sunulan çeşitli oyunlar, her tür oyun sevgilileri için mükemmel bir seçenek olur. Casibom güncel giriş linkiyle her zaman güncel kalmak ve en iyi oyunları denemek için bu sayfayı takip edin. Casibom giriş sayfasından hemen giriş yapın ve casibon oyun dünyasına girebilirsiniz. Casıbom, güvenli bir ortamda oyun oynayabileceğiniz ve kazanabileceğiniz bir platformdur.

Casibom’da Oynanabilecek En İyi Oyunlar

Casibom’da oynanabilecek en iyi oyunlar arasında: slot oyunları, live dealer oyunları ve table oyunları bulunur. Slot oyunları arasında popüler olanlar arasında “Mega Moolah” ve “Starlight Princess” bulunur. Live dealer oyunları arasında “Live Roulette” ve “Live Blackjack” sayılabilir. Table oyunları arasında “Baccarat” ve “Poker” yer alır.

Slot Oyunları

Mega Moolah: bu slot oyunu, büyük jackpots ile bilinir. Her kırk sekiz kere oynandığında bir büyük jackpot rastele kazanılır. Oyunun grafikleri ve sesleri harika, oyun deneyimi çok güzeldir.

Starlight Princess: bu oyun, klasik slot oyunlarının en iyi örneklerinden biridir. 25 kuyruklu, 5×3 formatında oynanır ve harika grafiklerle bilinir. Jackpotlar oldukça büyük olabilir.

Advertisement

Live Dealer Oyunları

Live Roulette: canlı cüzzam oyunları, gerçek cüzzamçılarla oynanır. Oyunlar hızlı ve eğlenceli, aynı zamanda güvenli ve adildir. Live roulette, her zaman popülerdir ve her zaman oynanabilir.

Live Blackjack: bu oyun, canlı dealer ile oynanır ve oyunlar hızlı ve adildir. Blackjack, her zaman popüler bir oyun olup, her zaman oynanabilir.

Casibom’da oynanabilecek en iyi oyunları deneyin ve mutluluk bulun!

Casibom’da Güvenli ve Kolay Kayıt Adımları

Casibom’da kaydolmak için basit ve güvenli bir süreç izleyin. İlk adım, https://constitucion40.com/ giriş sayfasına gidin. Burada, kullanıcı adı ve e-posta adresi girerek veya sosyal medya hesaplarıyla hızlı bir şekilde giriş yapabilirsiniz. Kayıt sırasında, gerekli bilgileri doğru ve tam olarak doldurun. Bu, hesabınızın güvenliğini sağlayacaktır.

Advertisement

Kayıt tamamlandığında, hesabınızı doğrulamak için e-posta adresinize gönderilen doğrulama e-postasını kontrol edin. Bu adımdan sonra, Casibom’da tamamen giriş yapabilirsiniz. Güvenliğiniz için, hesabınıza erişim sağladığından emin olun ve şifrenizi düzenleyin.

Source link

Continue Reading

Crypto World

Bybit Backs Malaysia’s Hata in $8M Series A Funding Round

Published

on

Bybit Backs Malaysia’s Hata in $8M Series A Funding Round

Bybit has led an $8 million Series A funding round in Hata, a dual-licensed digital asset exchange operating in Malaysia. The round also included participation from global family offices and follows Bybit’s earlier investment in Hata’s $4.2 million seed round.

According to Monday’s announcement, the funding will be used to improve liquidity, expand the user base and develop additional digital asset products.

Hata operates under licenses from the Securities Commission Malaysia and the Labuan Financial Services Authority, allowing it to offer trading and custody services for digital assets in the Southeast Asian country.

Since launching in 2023, the company has reported more than 209,000 registered users and processed 1.04 billion Malaysian ringgits (about $225 million) in transaction volume in 2025.

Advertisement