The little triangle guy in the back contamination figure reminds me of Haloarcula japonicus
Gram-negative, motile by flagella, triangular disk, ca. 2-5 µm x 0.2-0.5µm.
The little triangle guy in the back contamination figure reminds me of Haloarcula japonicus
Gram-negative, motile by flagella, triangular disk, ca. 2-5 µm x 0.2-0.5µm.
A single word for this would be an animatic, probably.
If you’re asking why I believe that they don’t require presence, I’ve been interviewing with them and that’s my understanding from talking with them. The first line of copy on their website is
Anthropic is an AI safety and research company that’s working to build reliable, interpretable, and steerable AI systems.
Sounds pretty much like a safety org to me.
Anthropic does not require consistent physical presence.
These systems are designed to resist individual operators subverting controls—competently built cloud infrastructure doesn’t allow subversion of access controls to production systems even with physical access to data halls. I’ll speak to AWS’s controls in particular as an example, but I want to emphasize that this is a metonym for any competently run CSP.
AWS’s Nitro System is specifically architected with “zero operator access”—there is no mechanism for any AWS personnel, including those with the highest privileges, to access customer data. These are designed and tested technical restrictions built into the hardware itself, not policy controls that can be overridden. The system uses tamper-resistant TPMs with hardware roots of trust, and there is no equivalent of a “root” user or administrative bypass—even for maintenance. This has been independently validated by NCC Group, who found “no gaps in the Nitro System that would compromise these security claims” and “no indication that a cloud service provider employee can obtain such access...to any host.” You may also enjoy as a bonus a quick read through the Mantle whitepaper.
The assumption that datacenter executives could “just walk up to” machines and exfiltrate data conflates physical proximity with system access. Physical access to a server room doesn’t necessarily grant access to customer data.