In particular, the model needs to bypass our control measures, which have been designed to secure against deliberate, best-effort attacks by the model, and the model needs to not get caught trying to do so during evaluations.
Hopefully, but I wouldn’t necessarily expect that we’ll have reasonably well designed control measures in place!
Hopefully, but I wouldn’t necessarily expect that we’ll have reasonably well designed control measures in place!