/
Navigation
C
Chronicles
Browse all articles
C
E
Explore
Semantic exploration
E
R
Research
Entity momentum
R
N
Nexus
Correlations & relationships
N
~
Story Arc
Topic evolution
S
Drift Map
Semantic trajectory animation
D
P
Posts
Analysis & commentary
P
Browse
@
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
?
Concept Search
Semantic similarity search
!
High Impact Stories
Top coverage by position
+
Sentiment Analysis
Positive/negative coverage
*
Anomaly Detection
Unusual coverage patterns
Analysis
vs
Rivalry Report
Compare two entities head-to-head
/\
Semantic Pivots
Narrative discontinuities
!!
Crisis Response
Event recovery patterns
Connected
Nav: C E R N
Search: /
Command: ⌘K
Embeddings: large
VOICE ARCHIVE

Mihai Maruseac

@mihaimaruseac
3 posts
2026-03-03
“In particular, the key element required for democracy, such as protection of privacy, must be defended by all of society” Happy to say that I've been working on this for the past month, with a great team
2026-03-03 View on X
Financial Times

Sam Altman says OpenAI amended its DOD contract to ensure “the AI system shall not be intentionally used for domestic surveillance of US persons and nationals”

Sam Altman says company is working with defence department on provisions covering mass surveillance

“In particular, the key element required for democracy, such as protection of privacy, must be defended by all of society” Happy to say that I've been working on this for the past month, with a great team
2026-03-03 View on X
@sama

Sam Altman says that “the democratic process must stay in control, and we must democratize AI” and that no private company should decide the fate of the world

(I also would like to share this, which I wrote after thinking a little more.)  There is a lot we will talk about in the coming days …

2024-03-01
ML models are not inspectable and not interpretable. To prevent malware, you should only use models with supply chain provenance and signature from identities you trust https://jfrog.com/...
2024-03-01 View on X
BleepingComputer

JFrog finds ~100 malicious PyTorch and Tensorflow Keras models on Hugging Face, some of which can execute code on users' machines to give attackers a backdoor