It think there are different aspects of the normal control problem. Stopping it have malware that bumps it into desks is probably easier than stopping it have malware that exfiltrates sensitive data. But having a gradual progression and focusing on control seems like the safest way to build these things.
All the advancements of spam filtering I’ve heard of recently have been about things like DKIM and DMARC. So not based on user feedback. I’m sure google does some things based on users clicking spam on mail, but it has not filtered into the outside world much. Most malware detection (AFAIK) is based on looking at the signatures of the binaries not on behaviour, to do that you would have to have some idea of what the user wants the system to do.
Also, quick nitpick: We do for the moment “control our computers” in the sense that each system is corrigible. We can pull the plug or smash it with a sledgehammer.
I’ll update the control of computers section to say I’m talking about subtler control than wiping/smashing hard disks and starting again. Thanks,
can you smash NSA mass surveillance computer centre with a sledgehammer?
ooops, bug detected… and AGI may have already been in charge
remember, US milispying community is openly crying for years that someone should explain them why is AI doing what it is doing (read: please , dumb it down to our level… not gonna happen)
It think there are different aspects of the normal control problem. Stopping it have malware that bumps it into desks is probably easier than stopping it have malware that exfiltrates sensitive data. But having a gradual progression and focusing on control seems like the safest way to build these things.
All the advancements of spam filtering I’ve heard of recently have been about things like DKIM and DMARC. So not based on user feedback. I’m sure google does some things based on users clicking spam on mail, but it has not filtered into the outside world much. Most malware detection (AFAIK) is based on looking at the signatures of the binaries not on behaviour, to do that you would have to have some idea of what the user wants the system to do.
I’ll update the control of computers section to say I’m talking about subtler control than wiping/smashing hard disks and starting again. Thanks,
can you smash NSA mass surveillance computer centre with a sledgehammer?
ooops, bug detected… and AGI may have already been in charge
remember, US milispying community is openly crying for years that someone should explain them why is AI doing what it is doing (read: please , dumb it down to our level… not gonna happen)