Comparison
Winner: Source B is less manipulative
Source B appears less manipulative than Source A for this narrative.
Source B
Topics
Instant verdict
Narrative conflict
Source A main narrative
Hence it’s finding vulnerabilities that humans have missed,” he says.
Source B main narrative
Now Bloomberg has reported that a “private online forum,” the members of which have not been publicly identified, has managed to gain access to the tool through a third-party vendor.
Conflict summary
Stance contrast: Hence it’s finding vulnerabilities that humans have missed,” he says. Alternative framing: Now Bloomberg has reported that a “private online forum,” the members of which have not been publicly identified, has managed to gain access to the tool through a third-party vendor.
Source A stance
Hence it’s finding vulnerabilities that humans have missed,” he says.
Stance confidence: 83%
Source B stance
Now Bloomberg has reported that a “private online forum,” the members of which have not been publicly identified, has managed to gain access to the tool through a third-party vendor.
Stance confidence: 53%
Central stance contrast
Stance contrast: Hence it’s finding vulnerabilities that humans have missed,” he says. Alternative framing: Now Bloomberg has reported that a “private online forum,” the members of which have not been publicly identified, has managed to gain access to the tool through a third-party vendor.
Why this pair fits comparison
- Candidate type: Closest similar
- Comparison quality: 49%
- Event overlap score: 22%
- Contrast score: 74%
- Contrast strength: Strong comparison
- Stance contrast strength: High
- Event overlap: Event overlap is weak. Issue framing and action profile overlap.
- Contrast signal: Interpretive contrast is visible, but event linkage is moderate: verify against primary sources.
Key claims and evidence
Key claims in source A
- Hence it’s finding vulnerabilities that humans have missed,” he says.
- Treat Mythos as the warning shot it is,” says Curran.
- Reports suggest that they simply made an “educated guess” about where the model would be hosted online – the same sort of issue that led to the revelation of the existence of Mythos in the first place.
- there’s a good reason the model had been kept behind closed doors: it is – by accident rather than design – extremely good at hacking.
Key claims in source B
- Now Bloomberg has reported that a “private online forum,” the members of which have not been publicly identified, has managed to gain access to the tool through a third-party vendor.
- We’re investigating a report claiming unauthorized access to Claude Mythos Preview through one of our third-party vendor environments,” an Anthropic spokesperson told TechCrunch.
- A group of unauthorized users has reportedly gained access to Mythos, the cybersecurity tool recently announced by Anthropic.
- Much has been made of Mythos and its purported power — an AI product designed for enterprise security that, in the wrong hands, could become a potent hacking tool, according to the company.
Text evidence
Evidence from source A
-
key claim
Reports suggest that they simply made an “educated guess” about where the model would be hosted online – the same sort of issue that led to the revelation of the existence of Mythos in the…
A key claim that anchors the narrative framing.
-
key claim
Hence it’s finding vulnerabilities that humans have missed,” he says.
A key claim that anchors the narrative framing.
-
emotional language
Kevin Curran at Ulster University, UK, says that the revelation of Mythos and what it might be able to do “triggered alarm across the security industry”, although researchers were divided o…
Emotionally loaded wording that may amplify audience reaction.
-
evaluative label
Anthropic did not respond to New Scientist’s request for comment, but the company said on its website that “the fallout—for economies, public safety, and national security—could be severe.”…
Evaluative labeling that nudges a normative interpretation.
-
selective emphasis
Just one such bug would have been red-alert in 2025, and so many at once makes you stop to wonder whether it’s even possible to keep up,” wrote Holley.
Possible selective emphasis on specific aspects of the story.
Evidence from source B
-
key claim
Now Bloomberg has reported that a “private online forum,” the members of which have not been publicly identified, has managed to gain access to the tool through a third-party vendor.
A key claim that anchors the narrative framing.
-
key claim
We’re investigating a report claiming unauthorized access to Claude Mythos Preview through one of our third-party vendor environments,” an Anthropic spokesperson told TechCrunch.
A key claim that anchors the narrative framing.
-
omission candidate
Reports suggest that they simply made an “educated guess” about where the model would be hosted online – the same sort of issue that led to the revelation of the existence of Mythos in the…
Possible context omission: Source B gives less emphasis to political decision-making context than Source A.
Bias/manipulation evidence
-
Source A · Appeal to fear
Kevin Curran at Ulster University, UK, says that the revelation of Mythos and what it might be able to do “triggered alarm across the security industry”, although researchers were divided o…
Possible fear appeal: threat-heavy wording may push a conclusion without equivalent evidence expansion.
How score signals are formed
Source A
39%
emotionality: 37 · one-sidedness: 35
Source B
26%
emotionality: 25 · one-sidedness: 30
Metrics
Framing differences
- Source A emotionality: 37/100 vs Source B: 25/100
- Source A one-sidedness: 35/100 vs Source B: 30/100
- Stance contrast: Hence it’s finding vulnerabilities that humans have missed,” he says. Alternative framing: Now Bloomberg has reported that a “private online forum,” the members of which have not been publicly identified, has managed to gain access to the tool through a third-party vendor.
Possible omitted/downplayed context
- Source B appears to downplay context related to political decision-making context.