TBPN Live - AI Is Coming for Your Memes, Crypto’s Quantum Clock, Axios Hack| Diet TBPN

Episode Date: April 1, 2026

Diet TBPN delivers the best of today’s TBPN episode in 30 minutes. TBPN is a live tech talk show hosted by John Coogan and Jordi Hays, streaming weekdays 11–2 PT on X and YouTube, with ea...ch episode posted to podcast platforms right after.Described by The New York Times as “Silicon Valley’s newest obsession,” the show has recently featured Mark Zuckerberg, Sam Altman, Mark Cuban, and Satya Nadella.TBPN is made possible by:Ramp - https://Ramp.comAppLovin - https://axon.aiCisco - https://www.cisco.comCognition - https://cognition.aiConsole - https://console.comCrowdStrike - https://crowdstrike.comElevenLabs - https://elevenlabs.ioFigma - https://figma.comFin - https://fin.aiGemini - https://gemini.google.comGraphite - https://graphite.comGusto - https://gusto.com/tbpnKalshi - https://kalshi.comLabelbox - https://labelbox.comLambda - https://lambda.aiLinear - https://linear.appMongoDB - https://mongodb.comNYSE - https://nyse.comOkta - https://www.okta.comPhantom - https://phantom.com/cashPlaid - https://plaid.comPublic - https://public.comRailway - https://railway.comRestream - https://restream.ioSentry - https://sentry.ioShopify - https://shopify.com/tbpnTurbopuffer - https://turbopuffer.comVanta - https://vanta.comVibe - https://vibe.coFollow TBPN: https://TBPN.comhttps://x.com/tbpnhttps://open.spotify.com/show/2L6WMqY3GUPCGBD0dX6p00?si=674252d53acf4231https://podcasts.apple.com/us/podcast/technology-brothers/id1772360235https://www.youtube.com/@TBPNLive

Transcript
Discussion (0)
Starting point is 00:00:00 Our president here at TBPN, Dylan Aberskato, headed to the TBPN newsletter, which you can sign up for at tbPN.com, and wrote a fantastic essay summarizing a trend that we've been discussing with him around how AI is changing meme making. And I found it very interesting. I'm glad that he wrote this. And so we'll read through this and then discuss it, debate it, and see where we can take it further. And then of obvious... And Dylan's from Long Island, New York. So John is going to be...
Starting point is 00:00:27 I'm going to do it in a Dylan Aberskado impression. of this. Memes are changing. That became abundantly clear during the Oscars a few weeks ago. When Conan tried to create a new Leonardo-Decchio memes, I don't know what accent that was. That's just like UFC announcer to go alongside the classic Leo memes in doing so, especially by using TFW, that feeling when, and the blocky white font that defined early internet memes, he inadvertently demonstrated that the meme templates millennials grew up with have become increasingly stale, even cringe. It's a good
Starting point is 00:01:02 point. Instead, AI-generated videos are the new meme template that every network and studio should be focusing their launches on. Look at what's happening with the Harry Potter reboot. When the trailer first dropped, the reaction to the new Snape played by Ghanian Ghanian, sorry. Gnaian. He's from Ghana.
Starting point is 00:01:20 English actor Papa Isidu was predictably and unfortunately negative. According to the L.A. Times, he received death threats since being cast in the new role. But after a few incredibly viral and well-produced AI videos, one, an original Snape versus Black Snape MMA match and another AI-generated rap video and another Dripworts, the school of drip, the narrative has started to shift. Have you seen any of these? The quote-unquote original Snape versus Black Snape-MMA match because I have not seen this one. And I think it is illustrative of what Dylan is talking about here. Snape v. Snape.
Starting point is 00:01:56 in the UFC ring. Here we go. Really photorealistic. Is this, does this, uh, are there any, uh, red flags here as a UFC enjoy, or does this feel like a proper UFC? I mean, the actual video quality is insane. So bulky. The video quality is insane.
Starting point is 00:02:20 Wait, but old Snape won. In the fight? Yeah. Okay. But I think it just, I, okay, wait, how, how do you know that? It just sort of like makes the characters more entertaining, more fun, shows you that this is just creativity at the end of the day. This is just, you should not be so up in arms about something that's a movie.
Starting point is 00:02:38 It's entertainment, and here's some more entertainment. And so you're adding entertainment to the discussion, and people are enjoying that. There's another AI-generated rap video about the new Snape, which we can pull up a little bit of here. AI meme videos are inherently viral and driving real awareness in a way its traditional memes no longer can, not just because they're novel and more entertaining, but because a single AI clip, can travel further and compound harder than traditional meme formats and social feeds that now heavily favor video. This suggests. Yeah, that's interesting. On X, it's still very easy for an image to go viral, but if you think about, you know, Instagram, YouTube, like a standalone image just can
Starting point is 00:03:16 no longer actually get that escape velocity. I mean, what about a dripped out Pope? Remember that? Yeah, a little bit, but people are just spending so much time in the short form feeds. And there can go in there, but there's certainly... This suggests a new playbook for marketers, especially in entertainment. If you're about to drop a trailer for a new movie or show, you need to be thinking about your rage-bate character,
Starting point is 00:03:39 the one people will latch onto, remix with AI and build around. Conan tried to force a Leo meme down our throats at the Oscars. Didn't see that because I was sleeping. But this might have worked 12 years ago. That playbook is over. Today, in rage fans and communities will,
Starting point is 00:03:53 if you're successful, take your characters or moments and turn them into something much bigger, entire cinematic universes. I'm just very impressed by the overall quality of those outputs. The Oscar selfie, I remember this. I think became the most liked image on Twitter at the time in 2014, briefly. This is the canonical clout bomb.
Starting point is 00:04:13 If you're a fan of Bradley Cooper, you like it. If you're a fan of Merrill Streep, you like it. You're a fan of Brad Pitt, you like it. And so you're amplifying the ultimate collab post. And this has become a format that's been used time and time again. But now the future is AI. Let's pull up the Dripworts School of Drip video. I want to watch this one.
Starting point is 00:04:33 Let's see if we can play this. That's Harry Potter. Are you really Harry Potter, my G? Shh. Type shit, type shit. Type shit. Type shit. None of that.
Starting point is 00:04:44 None of that, Broskey. We're all here on the Maybach Express for one reason and one reason only. And that's to go to Drip Watts, the School of Drip. The Maybach pulling the train is pretty good. So yes, very effective. I was reflecting on this and thinking about how it's not just AI videos that are unlocked as the new meme format. Like 20 years ago, video editing was extremely difficult. Like you had to do it on a desktop, you had to have a piece of software that probably cost a lot of money.
Starting point is 00:05:21 It was not widely accessible. And so these image makers, image memes, I was talking to Brandon about this, like, good guy Greg was one of these. or like the insanity wolf. And it would just be like one image of a duck. And the duck would be on sort of like a solid colored background. And that would be the template. And then somebody would put white text with black,
Starting point is 00:05:42 like block text impact font on the top and the bottom. And that was like the image meme. And that was accessible in the sense that it could be like generated on- On the fly. It was free to generate it basically. Then we got video editing, you know, Cap Cut, Instagram Reels as an editor called edits. And all of a sudden it became easy for someone to take a vibreel and put different text over it.
Starting point is 00:06:05 I send you a bunch of these where I'll find some crazy vibreel and I'll just recontextualize it with a new, yeah, you know, laughing thing. New caption, basically. And so the classic one is like those four jets and the new top gun. And it's like when you and the boys all drive somewhere in separate cars or something like that. You know, it's an example. But now you can generate, you know, full AI videos that can express the joke of the meme. And I think the next version of this is like software as a meme, S-A-A-M, something like that.
Starting point is 00:06:36 And we've been experimenting that with the simulators. There's TBPN simulator, Jeremy Gaffan simulator. There are more simulators coming. And all of a sudden, we, you know, the idea of building a video game, becoming a video game studio was like an impossible challenge. It would be months and months of time, maybe millions of dollars to get anything reasonable. So you had to be commercial about it. You could not do it as a comedy bit, but now you can, but increasingly it's going to be more and more just like a few prompts on your phone to get the piece of software that is that meme.
Starting point is 00:07:09 And you can think about the J-Mail suite from Riley Walls as another software as a meme moment where he's making a commentary on the Jeffrey Epstein saga and all of that, but he's instantiating the humor, the commentary in a piece of software that actually works. So there is a whole bunch of hack news going on. We're in a very weird week in terms of the news cycle because it's spring break. And so a lot of executives of big tag companies are like, don't launch while my kids are out of school and we're going on vacation. I actually think this is my real theory. So we're in a little bit of a slow news week. And you can see that like the journal is covering announcements that happened last week. They're talking about SORA.
Starting point is 00:07:50 They're talking about the Disney. They're talking about, you know, things that are more like reflective in Stratory. Ben Thompson has sort of a 50-year retrospective on Apple. It's not driven by a news item. It's not like Apple launched a new product this week. So Ben Thompson is taking a step back and reflecting it's a great piece. But there are a ton of crazy hacks. Starting with Axios, there's an active supply chain attack on Axios, one of NPM's most
Starting point is 00:08:16 dependent on packages. So if you have been vibe coding, Axios is a package that helps with HTTP requests. So it gets sucked into all sorts of different. projects, and if you upgrade it to the latest version, you basically got a virus with that. And if that's running in the cloud, it's building, and that's probably maybe bad because it could steal API keys or SSH keys. It could do a lot of things. It could wreak havoc on your system.
Starting point is 00:08:44 Also, if you built this piece of software and you included the contaminated Axios installer or package locally, it could potentially weasel its way out of your local environment and get onto your desktop. It's a virus. So be careful out there. And I'm sure people will be responding. The recommendation from Ferros, who sort of broke the news over at socket security, is that if you use Axios, pin your version immediately and audit your lock files do not upgrade. Socket analysis confirmed that this was malware. Plain CryptoJS is an obfuscated dropper loader that de-obuscates embedded payloads and operational strings at runtime, dynamically loads FSOS, and execs sync to evade static analysis, executes decoded shell, shell commands,
Starting point is 00:09:35 stages and copies payload files into OS temp, and Windows program data directories, deletes and renames artifacts post-execution to destroy forensic evidence. So, very risky. I would say, like, if you have installed this, you should just, like, freak out, basically. Should, and if you break your computer, that's like the first thing you should do. Just like try to slam it over your- Yeah, take the computer, throw it in the lake. That's how you should start.
Starting point is 00:10:01 I can-cure. I mean, practical, I mean, there is going to be some sort of like power law response here where of the people that are victims of the attack, they will go after the most vulnerable with the highest, like, ransomware potential. And I think we're seeing that with one company, I believe Mercor was targeted. But I don't know if that's being this. Don't believe, was that, my understanding is that,
Starting point is 00:10:22 yeah, the crazy thing is you have, you have this, like, Claude Code leak that, that was completely separate. That was separate. I'm nothing to do. Even though,
Starting point is 00:10:29 even though I do believe they use Axios in Claude Code. Okay. So it's something on that. Sure, sure, sure. And you have the Mercor leak, which is, it's a ransom.
Starting point is 00:10:38 It's a ransomware. Someone stole some data. Yeah, they stole a bunch of data. And now they're trying to, you know, get bids on it. We'll get to that in a little bit.
Starting point is 00:10:47 Okay. And then there's, there's this Axiose. supply chain attack. A niche had a little bit more context. He said a tiny piece of code called Axios runs inside almost every app on your phone and every website you visit. Developers
Starting point is 00:10:59 download it 100 million times a week. A few hours ago, someone poisoned it with malware that hands and attack or full control of your computer. If you've never heard of Axios, that's normal. It does one boring but important job. It lets apps talk to the internet. When a website pulls up your feed or an online checkout processes your card, Axios is probably doing
Starting point is 00:11:15 the work underneath. Over 173,000 other code packages plug into it. It's everywhere. The attacker stole a lead developer's login for NPM. Think of it as an app store, but for code that programmers used. Once inside, they swapped the developers email to an autonomous proton mail account and uploaded the poisoned version by hand. That jump past every security check the project normally runs before new code goes live. And this was not a rushed job. The stackers staged the malware at least 18 hours before pulling the trigger. They built separate versions for Windows, Mac, and Linux. They poisoned both the current version and an older one within 39 minutes
Starting point is 00:11:46 of each other, casting the widest net possible. Once the malware ran on a machine, it deleted itself to cover its tracks. The trick was smart. They never touched a single line of code inside Axios itself. Instead, they tucked in a fake add-on called Plain Cryptojs, built to pass as a well-known trusted library. It copied the real library's description and author info, so nothing looked off at a glance. When a developer installed Axios, this fake package quietly ran the malware on its own. When a smaller package called UA Parcerjs got hijacked back in 2021, with about 8 million weekly downloads. The security world treated it like a four alarm fire. Axios has 100 million over 12 Axi exposure with 173,000 packages depending on it. Socket, the security firm that flagged
Starting point is 00:12:28 this caught it in about six minutes. That's fast, but six minutes is still plenty of time for automated systems at companies everywhere to pull and install the bad version before anyone can react. If you or your team run Axios, freak TF out. No, lock your version to 1.14.0. Change every password API key and access token on any machine that installed the compromised update and check your network logs for connections to sFRCL.com or the IP address 14211 20673. Andre Carpathie said new supply chain attack this time for NPM Axios. The most popular HTTP client library with 300 million weekly downloads. That's a lot.
Starting point is 00:13:09 Scanning my system, Andre Carpathie says he found a use imported from Google Worker, from a few days ago when I was experimenting with Gmail G-Cal-C-C-LI. The installed version luckily resolved to the previous version, the unaffected 1.13.5, but the project dependency is not pinned, meaning that if he did this earlier today, the code would have resolved, everything would have updated, and he would have been poned. It is possible to personally defend against these to some extent with local settings, e.g. Release age constraint, or containers or etc. But I think ultimately the defaults of package management projects, PIP, NPM, et cetera, have to change so that a single injection,
Starting point is 00:13:57 usually luckily, fairly temporary in nature due to security scanning, does not spread through users at random and at scale via unpinned dependencies. So very, very crazy, crazy story. I just think it's bullish overall for cybersecurity. Like I think every cybersecurity company will probably do well. People are on edge already. And even though this type of attack has happened for years, long before, like, the popularity of vibe coding, it just feels like there's a bunch of new solutions that are needed.
Starting point is 00:14:30 The kind of incumbent cybersecurity players will do well. They're going to release a lot of new products. I think the question that I have is like, why seven minutes, right? Yeah. If, um, why not check it before it's merged in in the first place? Yeah, yeah. Or, or just like, you know, these are machines. So theoretically, they can be constantly monitoring versus like, yeah, I don't know. And, and the question is, uh, I, I, we're going to be digging into this story more over the next few days. But I'm, I'm interested to know, like,
Starting point is 00:15:01 it's found in seven minutes. When is it actually rolled back? If you look at 300 million weekly downloads, like clearly there are people that were downloading it at that moment in time at all, seven of those minutes, there's probably like thousands of downloads, if not tens of thousands. Like, how quickly was it rolled back? So is it only if you're in that seven minutes, or was it, it was discovered in seven minutes? And then it took them another 20 minutes to roll it back and stop serving the contaminated package. Understanding the scope of this, because it's very clear that, as Andre Carpathie explained, like, he was actively using it every single day and yet was not caught in that seven minute window. And so he was cleaned. And understanding the scope,
Starting point is 00:15:40 open scale of the impact is very much determined by how many, just how, just how broad and how many installs happened during the contamination. Anyway, Will Brown has a good take. He says, I hope someone Axios is reporting on this, and I completely agree. It's going to be, it's going to be confusing when they do. Last night, odd code, source code was leaked. Leaked via map file in the NPM registry. There's just a link to. Wait, someone just actually, do not. click a link. If somebody ever says, hey, I got some really great source code here, just click this link. Probably don't click it, let other people screenshot it. There's plenty of meta analysis over here.
Starting point is 00:16:20 Seems messy, seems unfortunate. Heart goes out to the folks who are dealing with the situation. At the same time, Codex is open source. It's not the end of the world. But it did reveal a bunch of things about the roadmap and also some of the internal April Fool's. That is the worst part. We love a secret surprise April Fool's joke. I love a good joke and nothing spoils a joke like hearing about it a day early. Much more importantly, there are lots of other critiques of the way Claude Code is implemented. What are the bad words? Yeah, I don't think this hurts their business at all.
Starting point is 00:16:56 No. Because people are using Claude code to make other products. Yeah. And then also having to take basically a fork of Claude code, maintain that, try to be shipping features against it, which is, again, I think. think it seems to not be legal at all to just fork the code base just because it's out there. Oh yeah, you can't just like steal it. People are converting it into other languages and maybe there's some argument there. But still, I don't think this hurts their business at all. Understand some of the secrets. What's special. But at the end of the day, all of these tools,
Starting point is 00:17:28 especially something in Clod Code that's so new, like it's more of like the process. It's more bad for the overall brand of vibe coding. Totally. Totally. Yeah. Yeah. It's rough. The irony here is that every time Anthropic has released any feature related to cybersecurity, all the big cyber companies have been selling off, you know, tens of billions of dollars. Yeah, yeah, yeah. The question of like, yeah, does this build trust in like using Viacode code to secure? Overall, overall, it hurts some trust, but again, very obviously going to get through this.
Starting point is 00:18:02 Yeah, so how it started, how it's going is, of course, landing like a ton of bricks. in the last 30 days, 100% of the contributions to Claude were written by Claude Code, and how it's going is that it leaked the source code, which is not what you want to have happen. This is like, you know, you didn't get to watch the Super Bowl, you have it DVR'd at home, do you want spoilers?
Starting point is 00:18:24 Should we review the April Fool's joke, or should we leave it unspoiled? It's cool. It's very cool. You've already read it? I read through it. But it's not to my, Were you belly laughing? I don't think we're getting a knee slapper out of it.
Starting point is 00:18:39 Okay. It's very cool. Okay. I think it'll be cute. Okay. Well, then we can move on. Tuki summed it up here. Do you understand what just happened to Anthropics?
Starting point is 00:18:47 Someone on their team ran a production build of Claude Code. The compiler generated a dot map file, which is literally a blueprint that reverses the entire code base back to its original source. And then they published it straight to NPM for the whole world to download. And it really does show you how fast the NPM downloads. There are people that are downloading at every single minimum. minute. And so even if it's only up there for a minute, someone's going to get it. And then all they need to do is send it to somebody, zip it and post a link on X and it goes viral. It's like locking
Starting point is 00:19:15 every door in your house, installing cameras, hiring armed guards, then accidentally uploading your floor plans to Google Maps. Does that matter? No, that's a bad analogy. I don't like that analogy. Floor plans are not why I lock every door in my house. I install cameras. I hire armed guards. Aren't floor plans public unlike Zillow? Oftentimes. Let's go over to Lisan Algae. Yes, yes, yes. A few takeaways from the collie. Code leak, Anthropic is actively using mythos for development. Okay. They are already
Starting point is 00:19:42 at Capybara V8. We learned last week that CapiBarras are huge, but can be deadly in the right context. Capi Bars still has issues The foreshadowing is crazy. The foreshadow he's crazy. We were talking about how the Faustian bargain that is getting up a Capi Bara as a pet.
Starting point is 00:20:00 It seems so cute, but it can bite you. Capi Bars has $1 million token. Context Window and Fassi Bauer. Cool. Numbat is another interesting code name tagged with at model launch. Remove this section when we launched Numbat. Fenwick seems to be the Fennick Fox. Fennex is very cute, but also not a domesticated animal.
Starting point is 00:20:20 How about we get some golden retriever code names? How about big fluffy poodle? That's a good code name for your animal-themed AI model. Anyway, let me tell you about console. Console builds AI agents that automate 70% of IT HR and finance support, giving employees instant resolution for access requests and password resets. And let me also tell you about Lambda.
Starting point is 00:20:43 Lambda is the superintelligence cloud, building AI supercomputers for training and inferences scale from one GPU to hundreds of thousands. Arvid says hot take, anthropic leaked Claude Code intentionally to get a Nerdosphere code review. It would have never gotten if they had just open sourced it. Oh, that's actually true. Way more attention. You don't leak your entire feature roadmap. You don't do, I mean, it's, it's funny.
Starting point is 00:21:06 and I'm sure they'll make the most of this. This is 4D chess right here. But I'm not seeing the 4D chess. I'm seeing the 40 chess now. I'm convinced. This is, I mean, we're in completely unsharted territory for marketing stunts and pre-releases and sneaky footage that goes viral and maybe was planted. You don't know.
Starting point is 00:21:25 And it's like some leaked account. Like, I don't know. I think everything's, I think the gloves are off. Everything's on the table. This could be an April Fool's joke. This could be a stunt to draw, to draw. drive attention to an open source move. Although, Tyler, you said that Dario is not a fan of open source at all, right?
Starting point is 00:21:42 He's like against it unilaterally. He doesn't want to do open source. I feel like, isn't there some steel man there where if you open source like opus two or something that's like really old, it's entirely commoditized in the research community. So all of those secrets that went into like making opus two good, those have been commoditized. They've been discussed at the house parties in SF. The researchers have moved from one place to another, so everyone knows these. They've implemented. They're available as open source, but by open sourcing your model, you can share with more of like the up and coming academic
Starting point is 00:22:19 community. Like if I'm a, if I'm a computer scientist, I'm interested in other research is already commoditized. Yeah, I guess you could just use the other ones. It doesn't really have a benefit. Maybe. Has any, has anyone at Anthropic, has anyone enthropic commented on? this at all? I haven't seen anyone. There is news out of Google. A Google paper warns that warns crypto on quantum risk ahead of 2029 timeline. So we've heard about the risk of quantum computing affecting the cryptocurrency industry, crypto projects broadly. There is some new research out of Google that provides some more perspective. So Google researchers have warned that future quantum computers may be able to break some of the cryptography protecting Bitcoin
Starting point is 00:23:03 and other digital assets with fewer resources than previously thought, adding urgency to the debate over how the industry should prepare. The researchers did not indicate such a machine exists today, but said new work suggests the computing power needed to carry out that kind of attack maybe lower than earlier estimates had suggested. In a Google Research blog post, this is from Bloomberg, the researchers said that a future quantum computer could break elliptic curve cryptography, a form of public key encryption used across much of the market. Their latest estimate
Starting point is 00:23:34 points to a 20-fold reduction in the quantum computing hardware needed to break what's known as ECDLP 256, a mathematical problem that helps secure crypto wallets in transactions. That does not mean Bitcoin and Ethereum are suddenly exposed, but the researchers in the white paper dated Monday said the clearest defense is a shift towards post-quantum cryptography or PQC. I'm sure this will be a hot topic over the next few months. A newer form of security designed to withstand attacks from powerful machines. They also urge the crypto industry to cut avoidable risks in the meantime. We urge all vulnerable cryptocurrency communities to join the migration to PQC without delay. Google cast the paper as a warning meant to give the industry time to act, not as a
Starting point is 00:24:19 prediction of imminent collapse. Last week, the tech giant introduced a timeline to fully migrate its own security systems to post quantum cryptography by 20. Have swirled for years in January, Coinbase established an independent advisory board to study what quantum computing could mean for the blockchain. That's the month. Christopher Wood, global head of equity strategy at Jeffries, removed a 10% allocation to Bitcoin from his model portfolio, citing fears that the advent of quantum computing could undermine the token. The time left before such machines arrive still appears longer than the time needed to move public blockchains to post-quantum cryptography. One concern that people in the community have had that I've seen talked about is this idea that if you did have a computer powerful enough to crack these encryption, unless you were like Google and you already had billions and billions and billions of dollars of cash flow, you wouldn't exactly stand up and say like, hey, I have cracked Bitcoin because the incentive for a certain team would just be to go around and find these wallets that were maybe maybe. didn't have any activity for a long time and just start cracking those individually. Because if you just stood up and said, hey, I have a quantum computer that destroys Bitcoin,
Starting point is 00:25:34 the price would go down. And then the hacker wouldn't get any benefit from it. What are quantum stocks doing on this news? Probably ripping. They rip on everything. So Nick Carter was talking about this. He said, many are wondering what Google saw that caused them to revise their post-quantum cryptography transition deadline to 2029 this week.
Starting point is 00:25:53 It was this, and it's from research, Google, research doc Google, which we will go through. Max the VC says Google's basically saying, we've cut the quantum resources needed to break Bitcoin's encryption by 20x. We can now break it. We can prove it. We're just not going to tell you how. We've slowed down research to give crypto a chance. You have until 2029 to figure out a solution.
Starting point is 00:26:15 Good luck. Elon chimed in and said, on the plus side, if you forgot your password, the password to your wallet, it will be accessible in the future. Also to everyone else. So the chance that NASA lands on the moon, we were tracking this yesterday. The missions are starting to happen. 4-2028 on Kalshi is now at 14 percent, before 2027 is at 4.7 percent. So they are racing.
Starting point is 00:26:40 Of course, this Artemis II mission is not boots on the ground on the moon. It is rocketing around the moon. We'll have more about this tomorrow. They're just going to check it out. They're going to be gone for 10 days. They're going to be in space for 10 days. days. Brenna Gerell was doing some deep dives on the technology, the streaming technology, what we really care about here, that will be on board, something like 20 cameras, 4K,
Starting point is 00:27:04 live streams, laser beams to make sure it's low latency. Super chats. It should be a lot of fun. Super chats would be good. We got to get a chat going. I'm sure there might actually be, because they usually stream on YouTube, and so I wouldn't be surprised if it's going to be a 24-7 perpetual stream that's always on, even when the Astero? Astronauts are taking a sleep? Yeah. Taking a little nap?
Starting point is 00:27:26 Yeah, yeah. Okay. All the conspiracy theorists are going to be sitting there, watching it very closely and then pausing. There was a glitch. Did you see that glitch? That was VFX. That was AI.
Starting point is 00:27:35 No, this is my mark. I will believe that it's real if I see an astronaut put three fingers in front of their face. Yep. Because this is the one thing that the AI can't do right now. If you're ever on a Zoom call with someone, do you suspect of being fake, a scammer who said, hey, let's get on Zoom.
Starting point is 00:27:53 let's talk about some financial investment opportunity. And it looks like someone you think is the person, but you suspect that it might not be. And they will be able to show you, look at the fingers. The fingers are perfect. It's fine, it's fine. That's because this part is not AI.
Starting point is 00:28:10 Just the face is AI. This is the deep fake stuff that's happening. So what you have to do is you have to ask them to hold up three fingers. They'll be like, yeah, three fingers. This is fine, right? I satisfy the task. You gotta say, no. Put the three fingers in front of your face.
Starting point is 00:28:21 Because if you put the three fingers in front of your face, the AI gets confused, and it breaks the deep fake that's happening underneath. Elon Colossus shares Elon has spent a decade trying to control an AI lab. He tried to absorb deep mind into Tesla in 2014, then Open AI in 2018. When that failed, an intern spoke up. It did not end well. He also tried to control XAI, to some degree. Doesn't he control XAI?
Starting point is 00:28:46 Well, he controls it, but at what cost? All seven co-founders gone. Oh, true, true. true. That's what you're referring to. Got it. Anyways, from the book, pushing back against Musk's obsession with the race against Google and DeepMond, Brockman added, it doesn't matter who wins if everyone dies. Musk responded the next morning at 3.52 a.m. He confronted Brockman with a proposal that recalled Pichai's pitch. Open AI should spin into Tesla. Initially, Open AI's team could accelerate Tesla's development of autonomous vehicles.
Starting point is 00:29:13 Next, it could use the profits from self-driving cars to fund its AGI moonshot. Tesla is the only path that could even hope to hold a candle to Google, Musk declared even then the probability of being a counterweight to Google is small. It just isn't zero. At an all-hands meeting on the top floor of a converted truck factory that housed Open AI, Musk announced to the employees that he was quitting the lab, scornfully adding that... I need raptors. I need a new Ford Raptor, potentially every day. We got to put this lab above a truck factory. Inside of a truck factory. This is amazing. scornfully adding that open AI would have to sprint faster to stay relevant. I guess they did.
Starting point is 00:29:51 Hoping to lure away some researchers, he declared there was a much better chance of building a GI at a strong business like Tesla. Showing courage or perhaps just youthful innocence and intern asked Musk if speed might be reckless from a safety perspective. Besides, wasn't developing AI at a for-profit company like Tesla the same as creating it at a for-profit company like Google. Isn't this going back to what you said you didn't want to do? the intern demanded, you're a jackass, must retorted, then he stormed out of the meeting.
Starting point is 00:30:18 That intern? Tyler Cosgrove. No. That intern was Steve Jobs. It's been an honor. See you tomorrow. Goodbye. Bye.

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.