How to Protect Your Digital Assets? A 15-Step Checklist from an OpenAI Co-founder

marsbit发布于2026-04-12更新于2026-04-12

文章摘要

In the era of advanced AI, cybersecurity is no longer optional but a necessity. As AI tools like Anthropic's Mythos enable highly sophisticated and automated attacks, personal digital security requires proactive measures. OpenAI co-founder Andrej Karpathy’s 15-step "digital hygiene" checklist offers a foundational guide to self-protection: 1. Use a password manager to generate unique passwords. 2. Enable hardware security keys (e.g., YubiKey) for 2FA. 3. Use biometric authentication (Face ID, fingerprint). 4. Treat security questions as passwords—use random answers. 5. Encrypt disks (FileVault/BitLocker). 6. Reduce smart home devices to minimize attack surfaces. 7. Use Signal for encrypted messaging with auto-delete. 8. Switch to privacy-focused browsers like Brave. 9. Use independent search engines (e.g., Brave Search). 10. Employ virtual credit cards (e.g., Privacy.com) for online payments. 11. Use virtual mailing addresses to protect physical location. 12. Avoid clicking email links; manually type URLs. 13. Use VPNs (e.g., Mullvad) on untrusted networks. 14. Enable DNS-level ad/tracker blocking (e.g., NextDNS). 15. Monitor network activity with tools like Little Snitch. With AI-powered threats likely to become widely available soon, implementing these steps now is critical to safeguarding digital assets.

Editor's Note: As AI capabilities approach the boundaries of "general-purpose tools," the meaning of cybersecurity is also changing. It is no longer just a defense issue against hackers, viruses, or data breaches; it is evolving into a game of "asymmetric capabilities."

With Anthropic's release of Claude Mythos demonstrating vulnerability discovery capabilities close to those of top experts, cyber attacks are entering a new, more covert and automated phase. Personal security is shifting from an "option" to a "necessity." On one hand, the barrier to attack is being lowered; on the other, attack efficiency is increasing exponentially. This means "passive security" will become increasingly difficult to sustain.

Against this backdrop, the "digital hygiene" checklist proposed by OpenAI co-founder Andrej Karpathy offers an actionable path forward. In the AI era, security is no longer about "remedies after an incident" but rather "part of daily behavior." Identity verification, permission isolation, information minimization, and the restructuring of behavioral habits. These seemingly trivial 15 steps essentially rebuild a security boundary that an average user can control.

The real risk is not whether you become a target, but whether you are completely unprepared when an attack occurs.

The original text follows:

One thing is certain: when it comes to cybersecurity, you no longer have room to be lazy.

Anthropic's landmark release of Mythos yesterday marks a point of no return.

This technology is not yet public, but once it falls into the hands of malicious actors (which is almost inevitable)... you will be facing an extremely advanced cyber attack. Most people will find it's too late even before they realize they have been compromised.

It's like the "COVID-19" of the software world.

And precisely because of this, from now on, your cybersecurity must be watertight.

Karpathy's Digital Hygiene Guide

Last year, Andrej Karpathy (@karpathy, OpenAI co-founder) compiled a "Digital Hygiene Guide," systematically outlining the fundamental methods for protecting oneself in the AI era.

This is one of the most worthwhile introductory guides I have seen.

Here are all the security measures you should take in this era of uncertainty:

1. Use a Password Manager (e.g., 1Password)

Generate a unique, random password for every account you own. Once a service is breached, attackers often use these credentials for "credential stuffing" attacks. A password manager completely eliminates this risk and even auto-fills, making it faster to use than reusing passwords.

2. Configure Hardware Security Keys (e.g., YubiKey)

This is a physical device that serves as a second factor for login. An attacker must "physically possess it" to access your account. In contrast, SMS codes are easily stolen via SIM swap attacks (where someone impersonates you to your carrier to transfer your number to their phone).

It's recommended to buy 2–3 YubiKeys and store them separately to avoid being locked out if one is lost.

3. Enable Biometrics Fully

Such as Face ID, fingerprint recognition, etc. Enable it in your password manager, banking apps, and important applications. This is the third layer of verification: you "yourself." No one can steal your face from a database.

4. Treat Security Questions Like Passwords

Questions like "What is your mother's maiden name?" can be found online in 10 seconds. Generate random answers and store them in your password manager. Never provide real information.

5. Enable Disk Encryption

Called FileVault on Mac and BitLocker on Windows. If your computer is stolen, encryption turns it into a "brick" rather than giving the thief all your data. Enabling it takes 2 minutes and runs automatically in the background.

6. Reduce Smart Home Devices

Every "smart device" is essentially an internet-connected computer, often with a microphone. They continuously collect data, frequently connect to the internet, and are often breached. Your connected air quality monitor doesn't need to know your precise location. Fewer devices mean fewer attack vectors.

7. Use Signal for Communication

Signal provides end-to-end encryption. No one (including the platform itself, carriers, or eavesdroppers) can read the content. Regular SMS and even iMessage retain metadata (who, when, frequency of contact). Enable "disappearing messages" (e.g., 90 days) to prevent historical records from becoming a risk.

8. Use a Privacy-Focused Browser (e.g., Brave)

Based on Chromium, compatible with Chrome extensions, the user experience is almost identical.

9. Switch Your Default Search Engine to Brave Search

It has an independent index (unlike DuckDuckGo, which relies on Bing). If a search result is poor, you can add "!g" to jump to Google. The paid version is about $3 per month and is worth it—you become the customer, not the "product being sold."

10. Use Virtual Credit Cards (e.g., Privacy.com)

Generate a unique card number for each merchant and set spending limits. You can even use random names and addresses. If a merchant is breached, only a disposable card number is leaked, not your real financial information.

11. Use a Virtual Mailing Address

Services like Virtual Post Mail receive your physical mail, scan the contents, and let you view it online.

You can decide what to shred and what to forward. This way, you don't have to hand over your real home address to various unfamiliar merchants every time you shop online.

12. Don't Click Links in Emails

Email addresses are extremely easy to spoof. With the help of AI, phishing emails are now almost indistinguishable from real ones. Instead of clicking links, manually type the website address and log in yourself.

Also, disable automatic image loading in your email client, as embedded images are often used to track whether you've opened the email.

13. Use a VPN Selectively (e.g., Mullvad)

A VPN (Virtual Private Network) hides your IP address (the unique number identifying your device and location) from the services you access. You don't need to have it on all the time, but definitely enable it when using public Wi-Fi or accessing less trusted services.

14. Set Up DNS-Level Ad Blocking (e.g., NextDNS)

Think of DNS as the phonebook your device uses to "look up websites." Blocking at this layer means ads and trackers are stopped before they even load.

And it works for all apps and browsers on your device.

15. Install a Network Monitoring Tool (e.g., Little Snitch)

It shows you which applications on your computer are connecting to the internet, how much data they're sending, and where it's going. Any app that "phones home with abnormally high frequency" should be treated with suspicion and likely uninstalled.

Currently, Mythos remains only in the hands of the defense side of Project Glasswing (like Anthropic, Apple, Google, etc.). But models with similar capabilities will soon fall into the hands of malicious actors (perhaps in less than 6 months, or even sooner).

This is why you must strengthen your security now. Spending 15 minutes on these settings now can help you avoid a series of serious problems in the future.

Stay safe, and all the best.

相关问答

QWhat is the main theme of Andrej Karpathy's digital hygiene guide in the context of AI advancements?

AThe main theme is proactive personal cybersecurity in the AI era, emphasizing that security must become a daily habit rather than a reactive measure, as AI-powered attacks become more automated and sophisticated.

QWhy does the article recommend using hardware security keys like YubiKey instead of SMS-based two-factor authentication?

ABecause SMS codes are vulnerable to SIM swap attacks, where attackers can transfer a victim's phone number to their own device. Hardware security keys require physical possession, providing a much higher level of security.

QAccording to the guide, how should one handle security questions for online accounts?

ASecurity questions should be treated like passwords. Instead of providing real answers, which can often be found online, one should generate random answers and store them in a password manager.

QWhat is one specific financial security practice recommended to protect one's identity when shopping online?

AThe use of virtual credit cards (e.g., from Privacy.com) is recommended. This allows users to generate unique, disposable card numbers for each merchant, with spending limits, to prevent exposing their real financial identity if a merchant is breached.

QWhat analogy does the article use to describe the threat posed by advanced AI tools like Anthropic's Mythos in the wrong hands?

AThe article analogizes it to a 'COVID-19 for the software world,' indicating it is an extremely advanced, highly contagious, and hard-to-detect threat that can cause widespread damage before one even realizes they have been compromised.

你可能也喜欢

以太坊获机构瞩目——Etherealize CEO如是说

加密货币领域持续发展,以太坊(ETH)正获得越来越多的机构关注,其角色已超越单纯的数字资产。Etherealize首席执行官Vivek Raman表示,以太坊正逐渐成为机构投资组合中的核心资产,与比特币地位相当,并可能成为下一代金融基础设施的基础层。 Raman指出,随着资产增长,机构对ETH的配置是必然趋势。他提到哈佛大学从比特币现货ETF转向以太坊现货ETF的例子,并强调ETH的权益证明机制能带来可观收益,这些因素将推动其成为新的价值存储手段,并促进价格上涨。 此外,Raman还讨论了以太坊网络上资产代币化和稳定币的显著增长,认为大多数高价值的代币化资产和稳定币将在该网络上发行。由于ETH作为去中心化、抗审查的抵押资产,其价值将随着区块链上资产代币化的发展而提升。 长期来看,尽管以太坊短期走势疲软,但前景依然乐观。有分析师预测,到2033年ETH价格可能达到12,000至38,000美元,另有人预测2030年将达60,000美元。当前ETH价格约为2,300美元,短期增长已被市场消化。 专家指出,以太坊生态系统年手续费收入达38.2亿美元,第二层网络处理了大部分交易。随着稳定币规模增长、技术升级持续推进以及机构采用率提升,以太坊被严重低估,未来潜力巨大。

bitcoinist4小时前

以太坊获机构瞩目——Etherealize CEO如是说

bitcoinist4小时前

交易

现货
合约

热门文章

加密市场宏观研报:原油飓风、AI巨浪与比特币的十字路口

全球金融市场正经历一场由地缘冲突引发的系统性重估:霍尔木兹海峡封锁导致原油一度暴涨30%,G7紧急释放储备后涨幅收窄,滞胀风险取代通胀成为核心担忧,美元成为“唯一避风港”并逼近100大关,亚太及美股遭遇“黑色星期一”全线重挫;AI领域则冰火两重天,国家发改委提出“十五五”末10万亿规模目标,OpenClaw项目火爆推动概念股狂飙;比特币在宏观风暴中跌破70000美元关键防线。

341人学过发布于 2026.03.12更新于 2026.03.12

加密市场宏观研报:原油飓风、AI巨浪与比特币的十字路口

相关讨论

欢迎来到HTX社区。在这里,您可以了解最新的平台发展动态并获得专业的市场意见。以下是用户对AI(AI)币价的意见。

活动图片