The idea of dividing failure stories into “failures involving rogue deployments” and “other failures” seems most useful if the following argument goes through
Hmm, I agree this division would be more useful if this argument went through, but I think it is quite useful even without this and this worth noting. (And indeed the post doesn’t make this argument and discusses subtle manipulation.)
I think subtle manipulation is a reasonably plausible threat model.
Hmm, I agree this division would be more useful if this argument went through, but I think it is quite useful even without this and this worth noting. (And indeed the post doesn’t make this argument and discusses subtle manipulation.)
I think subtle manipulation is a reasonably plausible threat model.