Skip to main content

EP255 Separating Hype from Hazard: The Truth About Autonomous AI Hacking

  • December 8, 2025
  • 2 replies
  • 37 views

chuvakin
Staff
Forum|alt.badge.img+9

Guest:

Topics: 

Artificial Intelligence

29:29

 

Subscribe at Spotify

Subscribe at Apple Podcasts

Subscribe at YouTube

Topics covered:

  • The term "AI Hacking Singularity" sounds like pure sci-fi, yet you and some other very credible folks are using it to describe an imminent threat. How much of this is hyperbole to shock the complacent, and how much is based on actual, observed capabilities today? 
  • Can autonomous AI agents really achieve that "exploit - at - machine - velocity" without human intervention for the zero-day discovery phase?
  • On the other hand, why may it actually not happen?
  • When we talk about autonomous AI attack platforms, are we talking about highly resourced nation-states and top-tier criminal groups, or will this capability truly be accessible to the average threat actor within the next 6-12 months? What's the "Metasploit" equivalent for AI-powered exploitation that will be ubiquitous? 
  • Can you paint a realistic picture of the worst-case scenario that autonomous AI hacking enables? Is it a complete breakdown of patch cycles, a global infrastructure collapse, or something worse?
  • If attackers are operating at "machine speed," the human defender is fundamentally outmatched. Is there a genuine "AI-to-AI" counter-tactic that doesn't just devolve into an infinite arms race? Or can we counter without AI at all?
  • Given that AI can expedite vulnerability discovery, how does this amplified threat vector impact the software supply chain? If a dependency is compromised within minutes of a new vulnerability being created, does this force the industry to completely abandon the open-source model, or does it demand a radical, real-time security scanning and patching system that only a handful of tech giants can afford?
  • Are current proposed regulations, like those focusing on model safety or disclosure, even targeting the right problem? 
  • If the real danger is the combinatorial speed of autonomous attack agents, what simple, impactful policy change should world governments prioritize right now?

2 replies

Kels
Forum|alt.badge.img
  • New Member
  • March 8, 2026

Again I gotta do this fucking ass nine I wanna know why Google is API firebase Accident hires a bunch of clowns after they fix it for that once you get a fucking team of guys to do it for you you got a bunch of fucking hackers working for you cause I know I don’t know how I know because a motherfucker had that shit installed my phone and fucked my life up. Cost me a house a boat a car and a marriage and 32 of my three children

I hope somebody reports this too cause you could kiss my ass. I want you to go get yourself another badge because you fixed how to login somewhere.


Kels
Forum|alt.badge.img
  • New Member
  • March 8, 2026

Here’s a reply for you concerning that I was hacked for a year and a half that I can document and everybody told me you can’t do that on an iPhone 1000 times then Apple came out and said oh yeah I guess she can do that for a year and a half I told them everything that came out on February 11. I had happened a year and a half ago February 11 and some of it twice as long as three years ago the problem is technology is advanced so rapidly, the Google and Apple and all the larger tech companies they can’t afford to hire the people they need to hire so they get a bunch of clowns to do it part-time when they find something they give them a reward well these clowns work for Google doing that shit and then they turn around and hack them first when they find a discrepancy or vulnerability they turn around they hacked the shit out of that vulnerability and then they tell I found a loophole or Apple hey, I found this problem. I know how I know how the fuck do you think I found this little community years cause they use my freaking email to get into it and even hacking me for a year and a half. Nobody cares Text emailed Google so many times it’s not funny. I never had a reply firebase council I found that in my phone I found more Google helping the guy hack me with the same API fire base serial number I gave them a month prior to that so this guy installed it somewhere in my phone. I don’t know anything about the shit. I’m a freaking brick layer via Google is $864 billion a year in revenue company and they don’t have a call center. Are you shitting me? I paid for that. No they’re paying this guy to fucking hack me. Everybody’s so busy slapping himself on the back at Apple saying hey you can’t chew that with an iPhone they’re too busy slapping themselves on the back that they don’t stop and say hey maybe you can. It’s one thing to not know. It’s another thing to help somebody hack somebody enough spend the money get a call center and get some real cyber security going because it sucks you can’t you don’t even have a phone number. I found one phone number in a week of searching and nobody ever answered that phone go figure but I’m here to tell you if I gotta get a class action lawsuit together I’m going to get one together because it’s one thing to not know and not help with your policies and all that it’s another thing that when somebody emails you 25 fucking times and they don’t respond and then you turn around and find out that they’re helping them hack you that’s great cyber security. Y’all can give yourself a badge and accommodation for that one I put I put that on the Apple community page. I was taking down the first time in six hours second time in one hour. You can’t do that on an iPhone. There’s no useful content except the very next day. They came out and said well you can do that bunch of money grabbing nerds all you care about is how you can fix it the dumb ass problem why don’t you fix the real problem? The guys that are not only hacking but they’re also working for the company this I know technology is only good if you can control it and if you can actually use it safely and the problem with an iPhone is once they’re in your phone all that security works against you. I’m here to tell you firsthand passwords facial recognition. I don’t see what the big deal is with that they walked right through that shit. I figured out how they did it, though with your podcast talk about how to fix a login at a pet store.