This can easily be done, and be done safely, since you could give an AIXI root access to a virtualused machine.
I’m still waiting for evidence that it would do something destructive in the pursuit of a goal that’s is not obviously destructive.
This can easily be done, and be done safely, since you could give an AIXI root access to a virtualused machine.
I’m still waiting for evidence that it would do something destructive in the pursuit of a goal that’s is not obviously destructive.