Inferring properties of the authors of some text isn’t itself something I consider wildly useful for takeover, but I think of it as belonging to this more general cluster of capabilities.
You don’t? Ref the bribery and manipulation in eg. Clippy. Knowing who you are dealing with seems like a very useful capability in a lot of different scenarios. Eg. you mention phishing.
I agree; I meant something that’s better described as “this isn’t the kind of thing that is singularly useful for takeover in a way that requires no further justification or capabilities as to how you’d do takeover with it”.
You don’t? Ref the bribery and manipulation in eg. Clippy. Knowing who you are dealing with seems like a very useful capability in a lot of different scenarios. Eg. you mention phishing.
Great post! I’m all for more base model research.
Thanks!
I agree; I meant something that’s better described as “this isn’t the kind of thing that is singularly useful for takeover in a way that requires no further justification or capabilities as to how you’d do takeover with it”.