Close Menu
TechurzTechurz

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Emerging drone tech firms are powering the defense industry’s next chapter

    August 28, 2025

    AI Data Center Trust: Operators Remain Skeptical

    August 28, 2025

    115.000 Phishing-Emails in einer Woche versendet

    August 28, 2025
    Facebook X (Twitter) Instagram
    Trending
    • Emerging drone tech firms are powering the defense industry’s next chapter
    • AI Data Center Trust: Operators Remain Skeptical
    • 115.000 Phishing-Emails in einer Woche versendet
    • Why China Is Rewriting The Rules
    • Job titles of the future: Satellite streak astronomer
    • I compared a standard Wi-Fi router with a mesh setup – here’s which one I recommend
    • More than 10 European startups became unicorns this year
    • Plaud upgrades its card-sized AI note-taker with better range
    Facebook X (Twitter) Instagram Pinterest Vimeo
    TechurzTechurz
    • Home
    • AI
    • Apps
    • News
    • Guides
    • Opinion
    • Reviews
    • Security
    • Startups
    TechurzTechurz
    Home»AI»These protocols will help AI agents navigate our messy lives
    AI

    These protocols will help AI agents navigate our messy lives

    TechurzBy TechurzAugust 4, 2025No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    These protocols will help AI agents navigate our messy lives
    Share
    Facebook Twitter LinkedIn Pinterest Email

    What should these protocols say about security?

    Researchers and developers still don’t really understand how AI models work, and new vulnerabilities are being discovered all the time. For chatbot-style AI applications, malicious attacks can cause models to do all sorts of bad things, including regurgitating training data and spouting slurs. But for AI agents, which interact with the world on someone’s behalf, the possibilities are far riskier. 

    For example, one AI agent, made to read and send emails for someone, has already been shown to be vulnerable to what’s known as an indirect prompt injection attack. Essentially, an email could be written in a way that hijacks the AI model and causes it to malfunction. Then, if that agent has access to the user’s files, it could be instructed to send private documents to the attacker. 

    Some researchers believe that protocols like MCP should prevent agents from carrying out harmful actions like this. However, it does not at the moment. “Basically, it does not have any security design,” says Zhaorun Chen, a  University of Chicago PhD student who works on AI agent security and uses MCP servers. 

    Bruce Schneier, a security researcher and activist, is skeptical that protocols like MCP will be able to do much to reduce the inherent risks that come with AI and is concerned that giving such technology more power will just give it more ability to cause harm in the real, physical world. “We just don’t have good answers on how to secure this stuff,” says Schneier. “It’s going to be a security cesspool really fast.” 

    Others are more hopeful. Security design could be added to MCP and A2A similar to the way it is for internet protocols like HTTPS (though the nature of attacks on AI systems is very different). And Chen and Anthropic believe that standardizing protocols like MCP and A2A can help make it easier to catch and resolve security issues even as is. Chen uses MCP in his research to test the roles different programs can play in attacks to better understand vulnerabilities. Chu at Anthropic believes that these tools could let cybersecurity companies more easily deal with attacks against agents, because it will be easier to unpack who sent what. 

    How open should these protocols be?

    Although MCP and A2A are two of the most popular agent protocols available today, there are plenty of others in the works. Large companies like Cisco and IBM are working on their own protocols, and other groups have put forth different designs like Agora, designed by researchers at the University of Oxford, which upgrades an agent-service communication from human language to structured data in real time.

    Many developers hope there could eventually be a registry of safe, trusted systems to navigate the proliferation of agents and tools. Others, including Chen, want users to be able to rate different services in something like a Yelp for AI agent tools. Some more niche protocols have even built blockchains on top of MCP and A2A so that servers can show they are not just spam. 

    agents lives messy Navigate protocols
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleUkrainian drone attacks are causing blackouts and shutdowns for Russian mobile internet
    Next Article 6 Unconventional Habits That Actually Help Entrepreneurs Find Work-Life Sanity
    Techurz
    • Website

    Related Posts

    AI

    AI Data Center Trust: Operators Remain Skeptical

    August 28, 2025
    AI

    Job titles of the future: Satellite streak astronomer

    August 28, 2025
    AI

    Plaud upgrades its card-sized AI note-taker with better range

    August 28, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Start Saving Now: An iPhone 17 Pro Price Hike Is Likely, Says New Report

    August 17, 20258 Views

    You Can Now Get Starlink for $15-Per-Month in New York, but There’s a Catch

    July 11, 20257 Views

    Non-US businesses want to cut back on using US cloud systems

    June 2, 20257 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    Start Saving Now: An iPhone 17 Pro Price Hike Is Likely, Says New Report

    August 17, 20258 Views

    You Can Now Get Starlink for $15-Per-Month in New York, but There’s a Catch

    July 11, 20257 Views

    Non-US businesses want to cut back on using US cloud systems

    June 2, 20257 Views
    Our Picks

    Emerging drone tech firms are powering the defense industry’s next chapter

    August 28, 2025

    AI Data Center Trust: Operators Remain Skeptical

    August 28, 2025

    115.000 Phishing-Emails in einer Woche versendet

    August 28, 2025

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer
    © 2025 techurz. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.