<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Software on tomgromak.com</title><link>https://tomgromak.com/tags/software/</link><description>Recent content in Software on tomgromak.com</description><generator>Hugo -- 0.150.0</generator><language>en-us</language><lastBuildDate>Sat, 18 Apr 2026 05:00:00 -0500</lastBuildDate><atom:link href="https://tomgromak.com/tags/software/index.xml" rel="self" type="application/rss+xml"/><item><title>Update Your Software</title><link>https://tomgromak.com/posts/articles/2026/update-your-software/</link><pubDate>Sat, 18 Apr 2026 05:00:00 -0500</pubDate><guid>https://tomgromak.com/posts/articles/2026/update-your-software/</guid><description>&lt;p&gt;Anthropic (the company behind &lt;a href="https://claude.ai"&gt;Claude&lt;/a&gt;, the AI assistant I use daily) recently released a new model called &lt;a href="https://red.anthropic.com/2026/mythos-preview/"&gt;Claude Mythos Preview&lt;/a&gt;. If you&amp;rsquo;ve heard of it, you&amp;rsquo;ve probably noticed that it&amp;rsquo;s not available to us. That&amp;rsquo;s intentional, and the reason why has me all fired up.&lt;/p&gt;</description><content:encoded><![CDATA[<p>Anthropic (the company behind <a href="https://claude.ai">Claude</a>, the AI assistant I use daily) recently released a new model called <a href="https://red.anthropic.com/2026/mythos-preview/">Claude Mythos Preview</a>. If you&rsquo;ve heard of it, you&rsquo;ve probably noticed that it&rsquo;s not available to us. That&rsquo;s intentional, and the reason why has me all fired up.</p>
<p>Mythos Preview turns out to be extraordinarily capable at finding security vulnerabilities in software, in a way nothing before it has been. Anthropic&rsquo;s own testing found that it could identify zero-day vulnerabilities (bugs that nobody had previously found) in every major operating system and every major web browser. It found a 27-year-old bug in OpenBSD, an operating system known specifically for its security rigor. It found a 16-year-old vulnerability in FFmpeg, a media library that&rsquo;s been pored over by security researchers for years (and one that I use regularly). It did things that expert human security researchers said would have taken them weeks, in a matter of hours.</p>
<p>Because of this, Anthropic isn&rsquo;t releasing it to the general public. Instead, through something they&rsquo;re calling Project Glasswing, they&rsquo;re giving software companies and open source developers a window to use Mythos Preview to find and fix vulnerabilities before those same capabilities fall into other hands. I believe that&rsquo;s a genuinely responsible decision, and it&rsquo;s consistent with what I&rsquo;ve come to expect from them. Anthropic is more transparent than other major AI labs about the concerns they have with the technology they&rsquo;re building. They&rsquo;re promotional too, and I have significant concerns about their business model, but there&rsquo;s a philosophy behind their public-facing work that I find credible.</p>
<p>There&rsquo;s a catch, though: Anthropic isn&rsquo;t the only one building these tools.</p>
<p>They may be the first to reach this level of capability, or among the first. Leads in this industry are typically measured in months before others catch up. The same tools that allow Anthropic to hand Mythos Preview to software companies for defensive purposes will eventually be available to people with less responsible intentions. That&rsquo;s not speculation. It&rsquo;s the history of this field.</p>
<p>To understand why this matters, it helps to understand how exploit-finding has worked historically. Finding serious vulnerabilities in software has been genuinely difficult, labor-intensive work. It required deep expertise, time, and patience. Skilled attackers could do it, but the difficulty acted as a natural throttle on how often it happened. Major vulnerabilities surfaced a handful of times a year. Lately that cadence has been accelerating; significant vulnerabilities feel like a weekly occurrence now. What Anthropic found with Mythos Preview suggests we&rsquo;re about to see another jump in that pace. Finding and exploiting vulnerabilities that used to take skilled researchers weeks is now something that can happen in hours, at low cost, without human intervention after the initial prompt.</p>
<p>The deeper problem is that the software ecosystem they&rsquo;re trying to help isn&rsquo;t in great shape.</p>
<p>For a lot of software, especially from large companies with substantial resources, quality and security have been treated as secondary concerns. What matters is shipping, gaining market share, and getting to the next version. Microsoft&rsquo;s Windows releases are the perennial example: despite the resources available to them, new versions arrive with known problems that feel less like oversight and more like a business decision about acceptable quality thresholds. We, the users, end up as the final test environment. That&rsquo;s negligence, and I think it&rsquo;s worth naming it as such.</p>
<p>I want to be careful here, though, because not all software is like this. A lot of the software I rely on and love most was built by independent developers or small teams, often as a craft project or an open source effort run by volunteers. For those developers, finding and fixing every vulnerability isn&rsquo;t a matter of will. It&rsquo;s a matter of bandwidth. When a security bug surfaces in software built by someone genuinely trying to do right by their users, I extend real grace. It&rsquo;s the corporations with dedicated security teams that have less excuse.</p>
<p>Regardless of the reason, the result is the same: a lot of software running on a lot of computers has vulnerabilities in it. Those vulnerabilities have historically been protected, to some degree, by the sheer difficulty of finding them. That protection is diminishing.</p>
<p>So what does this actually mean for the rest of us?</p>
<p>I&rsquo;ve been someone who&rsquo;s cautious about software updates. New versions often introduce their own problems. Sometimes there&rsquo;s no going back once you&rsquo;ve updated. I&rsquo;ve watched people get burned by rushing to the latest version. When I help friends or family with their computers, I&rsquo;ll check whether their browser or operating system needs updating (browser updates in particular are usually just a restart away), but I&rsquo;ve held back from being too insistent about it.</p>
<p>I&rsquo;m changing my approach.</p>
<p>The calculus has shifted. The risk of keeping software with a known vulnerability, especially when that vulnerability can now be found and exploited faster and more cheaply than ever, outweighs the risk of dealing with whatever minor annoyances a new version might introduce. The downside of a buggy update is inconvenience. The downside of an unpatched vulnerability, in a world where exploit-finding is becoming increasingly accessible, is something much worse: potential access to your files, your accounts, your financial information, and your medical records. Think about how much of your life your software touches. Even if you wanted to opt out of all of it, you couldn&rsquo;t.</p>
<p>My advice is simple, and this applies to your operating system, your web browser, your apps, everything:</p>
<ul>
<li>When a software update includes security fixes, update promptly.</li>
<li>If you&rsquo;re not sure whether a given update includes security fixes, seriously consider updating anyway.</li>
<li>Enable automatic updates where you&rsquo;re comfortable doing so.</li>
</ul>
<p>If you help anyone else with their devices, this is worth a gentle push. Every time I sit down with someone to help them with something and I notice Chrome is running three versions behind, I ask if I can update it right then. I used to see it as a nice-to-do. Now it feels more urgent than that.</p>
<p>Where this goes from here is uncertain. We&rsquo;re in a period where the tools to find and exploit vulnerabilities are advancing faster than most software can be patched. Anthropic&rsquo;s Project Glasswing is an acknowledgment of that gap, and a genuine effort to use the same capability defensively before the offensive version spreads further. Whether the rest of the industry coordinates around this responsibly is an open question. Right now, the competitive dynamics of the AI space don&rsquo;t exactly reward slowdowns for collective safety.</p>
<p>What makes me cautiously hopeful, however, is that the capability cuts both ways. If AI tools for finding and fixing vulnerabilities become accessible to developers at every scale, the long-term outcome could actually be more secure software than we&rsquo;ve ever had. The care that independent developers bring to their work, combined with tools that can help them find what they&rsquo;d otherwise miss, is a genuinely promising combination. Anthropic&rsquo;s own write-up on this ends with a call to action for the security community, framing it as a moment like the launch of post-quantum cryptography work in 2016 (preparing for the day quantum computers could break today&rsquo;s encryption, years before that was an immediate threat), preparing for what&rsquo;s coming rather than reacting to it.</p>
<p>We just need to get there first. In the meantime: update your damn software.</p>]]></content:encoded></item></channel></rss>