After dissing Anthropic for limiting Mythos, OpenAI restricts access to Cyber
Hype, “Dangerous Models,” and Marketing
- Many see the “too dangerous to release” positioning of Mythos and Cyber as a marketing tactic: artificial scarcity, velvet ropes, and “my model is more dangerous than yours.”
- Some argue labs would release these models if it maximized revenue; withholding suggests either overhyped capabilities or genuine risk.
- Others think companies want to appear responsible and prepared in case their models are later linked to real-world cyberattacks.
Cybersecurity Capabilities and Verification
- Claims: current models have strong vulnerability-research capabilities and can find large numbers of bugs or vulnerabilities.
- Skepticism: lack of broad, trusted third‑party evaluation; some “benchmarks” are called anecdotal (e.g., tiny code samples).
- Some links and projects are cited as partial evidence that Mythos‑style capabilities are not uniquely beyond existing pay‑as‑you‑go models.
- Unclear whether Mythos is truly exceptional or just good marketing around incremental improvements.
Economics, Pricing, and Compute
- Discussion of DeepSeek V4 pricing being dramatically lower than OpenAI’s models; some suspect state subsidy, others note US tech has long been effectively subsidized too.
- Debate over whether inference is actually being subsidized: some say nobody is profitable at scale; others insist third‑party hosts and major providers have healthy per‑token margins.
- Compute scarcity and long lead times are seen as a major strategic factor; pre‑locking capacity may matter more than model quality.
OpenAI, Leadership, and Trust
- Strong distrust expressed toward OpenAI’s leadership, citing past reversals (e.g., RAM capacity rhetoric) and the CEO’s reputation for ruthlessness.
- Some note employees and media heavily backed leadership during prior board drama, suggesting internal loyalty but also a susceptibility to narrative management.
Safety Filters and Cyber Programs
- Users report more refusals on legitimate defensive security tasks and describe the Trusted Access Cyber program and its outsourced verification as clumsy.
- Debate on whether it’s technically possible to reliably distinguish offense from defense via text alone; some say in principle yes, others point to current tools as evidence of practical failure.
Local and Open Models vs Frontier
- Several argue local models are now “good enough” for many tasks and lag frontier models by only 6–12 months, undermining big labs’ moats.
- Examples of strong local models and new architectures are mentioned, though some users report reliability and context‑length issues.