Mårten Mickos (@martenmickos) 's Twitter Profile
Mårten Mickos

@martenmickos

On a mission to empower the world to build a safer internet. Believer in the freedom of speech.

ID: 26894723

linkhttps://www.hackerone.com/from-the-ceo calendar_today27-03-2009 00:00:13

17,17K Tweet

31,31K Followers

107 Following

Karri Saarinen (@karrisaarinen) 's Twitter Profile Photo

I was in Y Combinator back in summer 2012 with my first company. YC was really useful for me as a founder. While Jori Lallo and I knew how to build things, we were quite clueless as founders and building companies. YC demystifies a lot of it, and brings this level of non-bs

I was in <a href="/ycombinator/">Y Combinator</a> back in summer 2012 with my first company.

YC was really useful for me as a founder. While <a href="/jorilallo/">Jori Lallo</a> and I knew how to build things, we were quite clueless as founders and building companies. YC demystifies a lot of it, and brings this level of non-bs
Mårten Mickos (@martenmickos) 's Twitter Profile Photo

Nobody who rewatches Trump in 2016 and compares him with today could deny that his memory is patchier and his vocabulary smaller. ft.com/content/492c9c…

Roy Davis (@hack_all_things) 's Twitter Profile Photo

I just taught the HackerOne AI how to calculate a VISS score (viss.zoom.com)! This is a game changer! My team is analyzing the HAI VISS scores vs. human calculated VISS scores over the next few weeks to get some data on how well its working.

I just taught the <a href="/Hacker0x01/">HackerOne</a> AI how to calculate a VISS score (viss.zoom.com)! This is a game changer! My team is analyzing the HAI VISS scores vs. human calculated VISS scores over the next few weeks to get some data on how well its working.
Mårten Mickos (@martenmickos) 's Twitter Profile Photo

The first line of defense is Secure by Design. The last line of defense is a Bug Bounty program. At each step, security bugs are found and removed. Defense in Depth means you never stop testing.

The first line of defense is Secure by Design.
The last line of defense is a Bug Bounty program.
At each step, security bugs are found and removed.
Defense in Depth means you never stop testing.
benahorowitz.eth (@bhorowitz) 's Twitter Profile Photo

I sent an internal email that Axios got a hold of it. Here it is. This is what it is, there is nothing else no matter how it gets characterized: Political Update a16zers, I wanted to give you an update on my political activity. As I mentioned before, Felicia and I have known

Mårten Mickos (@martenmickos) 's Twitter Profile Photo

Meta's Product Security team is seeking a passionate hacker who derives purpose in life by revealing potential weaknesses and then crafting creative solutions to eliminate those weaknesses. metacareers.com/jobs/119988743…

Mårten Mickos (@martenmickos) 's Twitter Profile Photo

The five categories of AI benefits Dario Amodei is most excited about are: 1. Biology and physical health 2. Neuroscience and mental health 3. Economic development and poverty 4. Peace and governance 5. Work and meaning darioamodei.com/machines-of-lo…

Mårten Mickos (@martenmickos) 's Twitter Profile Photo

Imagine you want to start a business in AI. What layer of the stack do you target? Application layer AI companies are not just UIs on top of a foundation model. Far from it. They have sophisticated cognitive architectures. sequoiacap.com/article/genera…