Why are you concerned in that scenario? Any more concrete details on what you expect to go wrong?
I don’t think there’s a cure-it-all solution, except “don’t build it”, and even that might be counterproductive in some edge cases.
Very broad concerns but two totally random example risks:
During training, the model hacks out of my cluster and sends a copy of itself or a computer virus elsewhere on the internet. Later on, chaos ensues.
AI lawyer has me assassinated and impersonates me to steal my company.
Current theme: default
Less Wrong (text)
Less Wrong (link)
Arrow keys: Next/previous image
Escape or click: Hide zoomed image
Space bar: Reset image size & position
Scroll to zoom in/out
(When zoomed in, drag to pan; double-click to close)
Keys shown in yellow (e.g., ]) are accesskeys, and require a browser-specific modifier key (or keys).
]
Keys shown in grey (e.g., ?) do not require any modifier keys.
?
Esc
h
f
a
m
v
c
r
q
t
u
o
,
.
/
s
n
e
;
Enter
[
\
k
i
l
=
-
0
′
1
2
3
4
5
6
7
8
9
→
↓
←
↑
Space
x
z
`
g
Why are you concerned in that scenario? Any more concrete details on what you expect to go wrong?
I don’t think there’s a cure-it-all solution, except “don’t build it”, and even that might be counterproductive in some edge cases.
Very broad concerns but two totally random example risks:
During training, the model hacks out of my cluster and sends a copy of itself or a computer virus elsewhere on the internet. Later on, chaos ensues.
AI lawyer has me assassinated and impersonates me to steal my company.