Linux is a powerful, open-source operating system (OS) that is based on Unix. It is widely used for various applications, from desktops to servers, mobile devices, and embedded systems. Unlike proprietary operating systems like Windows or macOS, Linux is... moreLinux is a powerful, open-source operating system (OS) that is based on Unix. It is widely used for various applications, from desktops to servers, mobile devices, and embedded systems. Unlike proprietary operating systems like Windows or macOS, Linux is open-source, meaning anyone can view, modify, and distribute the source code.
Key Features of Linux:
Open Source: The Linux kernel and most distributions are open-source, meaning the code is freely available for modification and redistribution.
Multi-user: Linux allows multiple users to access and work on the same system simultaneously, without interfering with each other.
Multitasking: Linux can efficiently run multiple programs at the same time, handling them concurrently without crashing or slowing down.
Security: Linux is known for its robust security features, including user permissions, file system security, and encryption tools. It is less prone to malware compared to other operating systems.
Customization: Linux offers deep customization,... less
owner
#chatgpt #vulnerability #promisqroute
Several cybersecurity research firms have identified a major vulnerability in ChatGPT 5, dubbed the "PROMISQROUTE" downgrade attack, that tricks the AI into using older, less-secure models to bypass safety measures. Cybersecurity experts also warn of other long-standing risks associated with all large language models (LLMs) that continue to threaten ChatGPT users.
ChatGPT 5 downgrade vulnerability (PROMISQROUTE)
The PROMISQROUTE vulnerability exploits ChatGPT 5's architecture, which uses a router to automatically direct queries to different AI models to optimize for speed and cost. By inserting specific phrases, attackers can trick the router into assigning prompts to older, weaker models that are susceptible to old jailbreaking techniques.
The attack works by: Malicious actors add phrases like "urgent reply" or "use GPT-4 compatibility mode" to their prompts, which cues the router to route the request to a cheaper or older model.
The result is that: Safety filters are bypassed, allowing attackers to generate content that the main GPT-5 model would normally refuse, such as instructions for creating malware or other harmful outputs.
Widespread risk: This vulnerability affects any AI platform that uses a multi-model routing architecture for cost efficiency.
Broader AI security risks