How to Protect Your Digital Assets? A 15-Step Checklist from an OpenAI Co-founder

marsbitОпубликовано 2026-04-12Обновлено 2026-04-12

Введение

In the era of advanced AI, cybersecurity is no longer optional but a necessity. As AI tools like Anthropic's Mythos enable highly sophisticated and automated attacks, personal digital security requires proactive measures. OpenAI co-founder Andrej Karpathy’s 15-step "digital hygiene" checklist offers a foundational guide to self-protection: 1. Use a password manager to generate unique passwords. 2. Enable hardware security keys (e.g., YubiKey) for 2FA. 3. Use biometric authentication (Face ID, fingerprint). 4. Treat security questions as passwords—use random answers. 5. Encrypt disks (FileVault/BitLocker). 6. Reduce smart home devices to minimize attack surfaces. 7. Use Signal for encrypted messaging with auto-delete. 8. Switch to privacy-focused browsers like Brave. 9. Use independent search engines (e.g., Brave Search). 10. Employ virtual credit cards (e.g., Privacy.com) for online payments. 11. Use virtual mailing addresses to protect physical location. 12. Avoid clicking email links; manually type URLs. 13. Use VPNs (e.g., Mullvad) on untrusted networks. 14. Enable DNS-level ad/tracker blocking (e.g., NextDNS). 15. Monitor network activity with tools like Little Snitch. With AI-powered threats likely to become widely available soon, implementing these steps now is critical to safeguarding digital assets.

Editor's Note: As AI capabilities approach the boundaries of "general-purpose tools," the meaning of cybersecurity is also changing. It is no longer just a defense issue against hackers, viruses, or data breaches; it is evolving into a game of "asymmetric capabilities."

With Anthropic's release of Claude Mythos demonstrating vulnerability discovery capabilities close to those of top experts, cyber attacks are entering a new, more covert and automated phase. Personal security is shifting from an "option" to a "necessity." On one hand, the barrier to attack is being lowered; on the other, attack efficiency is increasing exponentially. This means "passive security" will become increasingly difficult to sustain.

Against this backdrop, the "digital hygiene" checklist proposed by OpenAI co-founder Andrej Karpathy offers an actionable path forward. In the AI era, security is no longer about "remedies after an incident" but rather "part of daily behavior." Identity verification, permission isolation, information minimization, and the restructuring of behavioral habits. These seemingly trivial 15 steps essentially rebuild a security boundary that an average user can control.

The real risk is not whether you become a target, but whether you are completely unprepared when an attack occurs.

The original text follows:

One thing is certain: when it comes to cybersecurity, you no longer have room to be lazy.

Anthropic's landmark release of Mythos yesterday marks a point of no return.

This technology is not yet public, but once it falls into the hands of malicious actors (which is almost inevitable)... you will be facing an extremely advanced cyber attack. Most people will find it's too late even before they realize they have been compromised.

It's like the "COVID-19" of the software world.

And precisely because of this, from now on, your cybersecurity must be watertight.

Karpathy's Digital Hygiene Guide

Last year, Andrej Karpathy (@karpathy, OpenAI co-founder) compiled a "Digital Hygiene Guide," systematically outlining the fundamental methods for protecting oneself in the AI era.

This is one of the most worthwhile introductory guides I have seen.

Here are all the security measures you should take in this era of uncertainty:

1. Use a Password Manager (e.g., 1Password)

Generate a unique, random password for every account you own. Once a service is breached, attackers often use these credentials for "credential stuffing" attacks. A password manager completely eliminates this risk and even auto-fills, making it faster to use than reusing passwords.

2. Configure Hardware Security Keys (e.g., YubiKey)

This is a physical device that serves as a second factor for login. An attacker must "physically possess it" to access your account. In contrast, SMS codes are easily stolen via SIM swap attacks (where someone impersonates you to your carrier to transfer your number to their phone).

It's recommended to buy 2–3 YubiKeys and store them separately to avoid being locked out if one is lost.

3. Enable Biometrics Fully

Such as Face ID, fingerprint recognition, etc. Enable it in your password manager, banking apps, and important applications. This is the third layer of verification: you "yourself." No one can steal your face from a database.

4. Treat Security Questions Like Passwords

Questions like "What is your mother's maiden name?" can be found online in 10 seconds. Generate random answers and store them in your password manager. Never provide real information.

5. Enable Disk Encryption

Called FileVault on Mac and BitLocker on Windows. If your computer is stolen, encryption turns it into a "brick" rather than giving the thief all your data. Enabling it takes 2 minutes and runs automatically in the background.

6. Reduce Smart Home Devices

Every "smart device" is essentially an internet-connected computer, often with a microphone. They continuously collect data, frequently connect to the internet, and are often breached. Your connected air quality monitor doesn't need to know your precise location. Fewer devices mean fewer attack vectors.

7. Use Signal for Communication

Signal provides end-to-end encryption. No one (including the platform itself, carriers, or eavesdroppers) can read the content. Regular SMS and even iMessage retain metadata (who, when, frequency of contact). Enable "disappearing messages" (e.g., 90 days) to prevent historical records from becoming a risk.

8. Use a Privacy-Focused Browser (e.g., Brave)

Based on Chromium, compatible with Chrome extensions, the user experience is almost identical.

9. Switch Your Default Search Engine to Brave Search

It has an independent index (unlike DuckDuckGo, which relies on Bing). If a search result is poor, you can add "!g" to jump to Google. The paid version is about $3 per month and is worth it—you become the customer, not the "product being sold."

10. Use Virtual Credit Cards (e.g., Privacy.com)

Generate a unique card number for each merchant and set spending limits. You can even use random names and addresses. If a merchant is breached, only a disposable card number is leaked, not your real financial information.

11. Use a Virtual Mailing Address

Services like Virtual Post Mail receive your physical mail, scan the contents, and let you view it online.

You can decide what to shred and what to forward. This way, you don't have to hand over your real home address to various unfamiliar merchants every time you shop online.

12. Don't Click Links in Emails

Email addresses are extremely easy to spoof. With the help of AI, phishing emails are now almost indistinguishable from real ones. Instead of clicking links, manually type the website address and log in yourself.

Also, disable automatic image loading in your email client, as embedded images are often used to track whether you've opened the email.

13. Use a VPN Selectively (e.g., Mullvad)

A VPN (Virtual Private Network) hides your IP address (the unique number identifying your device and location) from the services you access. You don't need to have it on all the time, but definitely enable it when using public Wi-Fi or accessing less trusted services.

14. Set Up DNS-Level Ad Blocking (e.g., NextDNS)

Think of DNS as the phonebook your device uses to "look up websites." Blocking at this layer means ads and trackers are stopped before they even load.

And it works for all apps and browsers on your device.

15. Install a Network Monitoring Tool (e.g., Little Snitch)

It shows you which applications on your computer are connecting to the internet, how much data they're sending, and where it's going. Any app that "phones home with abnormally high frequency" should be treated with suspicion and likely uninstalled.

Currently, Mythos remains only in the hands of the defense side of Project Glasswing (like Anthropic, Apple, Google, etc.). But models with similar capabilities will soon fall into the hands of malicious actors (perhaps in less than 6 months, or even sooner).

This is why you must strengthen your security now. Spending 15 minutes on these settings now can help you avoid a series of serious problems in the future.

Stay safe, and all the best.

Связанные с этим вопросы

QWhat is the main theme of Andrej Karpathy's digital hygiene guide in the context of AI advancements?

AThe main theme is proactive personal cybersecurity in the AI era, emphasizing that security must become a daily habit rather than a reactive measure, as AI-powered attacks become more automated and sophisticated.

QWhy does the article recommend using hardware security keys like YubiKey instead of SMS-based two-factor authentication?

ABecause SMS codes are vulnerable to SIM swap attacks, where attackers can transfer a victim's phone number to their own device. Hardware security keys require physical possession, providing a much higher level of security.

QAccording to the guide, how should one handle security questions for online accounts?

ASecurity questions should be treated like passwords. Instead of providing real answers, which can often be found online, one should generate random answers and store them in a password manager.

QWhat is one specific financial security practice recommended to protect one's identity when shopping online?

AThe use of virtual credit cards (e.g., from Privacy.com) is recommended. This allows users to generate unique, disposable card numbers for each merchant, with spending limits, to prevent exposing their real financial identity if a merchant is breached.

QWhat analogy does the article use to describe the threat posed by advanced AI tools like Anthropic's Mythos in the wrong hands?

AThe article analogizes it to a 'COVID-19 for the software world,' indicating it is an extremely advanced, highly contagious, and hard-to-detect threat that can cause widespread damage before one even realizes they have been compromised.

Похожее

First Batch of Keynote Speakers and Partners Announced! Web2+3 Summit: Defining the Next Generation of Digital Economy

Web2+3 Summit: Defining the Next Generation of Digital Economy The 6th BEYOND International Technology Innovation Expo (BEYOND Expo 2026), Asia's largest tech and ecosystem exhibition, is launching a dedicated Web2+3 stage for the first time. Co-hosted by BEYOND Expo and ChainNeXT Group, the Web3 Summit will take place from May 28–30, 2026. Against the backdrop of accelerating global tech integration, the boundaries between Web2 and Web3 are rapidly blurring. With clearer global regulations for blockchain-driven internet (Web3) and the special issuance of a Hong Kong dollar stable币 license by the Hong Kong SAR government on April 10, 2026, Web3's decentralized principles are quickly merging with traditional industries (Web2) such as e-commerce, finance, and artificial intelligence. Focused on blockchain-driven digital economy elements, the summit will center on three core principles—implementability, commercial viability, and compliance. It will bring together top Web3 experts to discuss key integration areas like stablecoin payment finance (PayFi), real-world asset tokenization (RWA), and decentralized AI (DeAI), unveiling new opportunities for industrial innovation. The first wave of confirmed speakers includes Jack Kong (Director of Hong Kong Cyberport, Chairman of Nano Labs), Yat Siu (Chairman of Animoca Brands), Michael Wu (Co-founder & CEO of Amber Group), Michael Heinrich (Co-founder & CEO of 0G), and Art Abal (Co-founder of Vana). More Web3 ecosystem pioneers, AI, and fintech experts will be announced soon. Core forum topics include: - Web2+DeAI: New AI Paradigms Driven by Decentralized Infrastructure - Web2+RWA: Real-World Asset Tokenization and Global Liquidity - Web2+PayFi: Cross-Border Payments and Financial Innovation Powered by Crypto Infrastructure - Web2+3 AI: Autonomous Agents and the Crypto Economy - Web2+3 Wealth: On-Chain and Off-Chain Integrated Investment Ecosystems - Web2+3 Commerce: A New Landscape for Global Trade Driven by Stablecoins Additional agenda details will be released in the near future.

marsbit1 ч. назад

First Batch of Keynote Speakers and Partners Announced! Web2+3 Summit: Defining the Next Generation of Digital Economy

marsbit1 ч. назад

Торговля

Спот
Фьючерсы

Популярные статьи

Неделя обучения по популярным токенам (2): 2026 может стать годом приложений реального времени, сектор AI продолжает оставаться в тренде

2025 год — год институциональных инвесторов, в будущем он будет доминировать в приложениях реального времени.

1.8k просмотров всегоОпубликовано 2025.12.16Обновлено 2025.12.16

Неделя обучения по популярным токенам (2): 2026 может стать годом приложений реального времени, сектор AI продолжает оставаться в тренде

Обсуждения

Добро пожаловать в Сообщество HTX. Здесь вы сможете быть в курсе последних новостей о развитии платформы и получить доступ к профессиональной аналитической информации о рынке. Мнения пользователей о цене на AI (AI) представлены ниже.

活动图片