I don’t understand why “scheming AI exfiltrates itself” and “scheming AI hacks its datacenter” are considered to be rogue deployments. Wouldn’t the unmonitored deployments in those cases be catastrophes themselves, caused by a monitored, not-yet-roguely-deployed AI?
I don’t understand why “scheming AI exfiltrates itself” and “scheming AI hacks its datacenter” are considered to be rogue deployments. Wouldn’t the unmonitored deployments in those cases be catastrophes themselves, caused by a monitored, not-yet-roguely-deployed AI?