Is it possible to run an AIXI approximation as root on a machine somewhere and give it the tools to shoot itself in the foot? Sure. Will it actually end up shooting itself in the foot? I don’t know. I can’t think of any theoretical reasons why it wouldn’t, but there are practical obstacles: a modern computer architecture is a lot more complicated than anything I’ve seen an AIXI approximation working on, and there are some barriers to breaking one by thrashing around randomly.
It’d probably be easier to demonstrate if it was working at the core level rather than the filesystem level.
Huh. I was under the impression it would require far too much computing power to approximate AIXI well enough that it would do anything interesting. Thanks!
Is it possible to run an AIXI approximation as root on a machine somewhere and give it the tools to shoot itself in the foot? Sure. Will it actually end up shooting itself in the foot? I don’t know. I can’t think of any theoretical reasons why it wouldn’t, but there are practical obstacles: a modern computer architecture is a lot more complicated than anything I’ve seen an AIXI approximation working on, and there are some barriers to breaking one by thrashing around randomly.
It’d probably be easier to demonstrate if it was working at the core level rather than the filesystem level.
Huh. I was under the impression it would require far too much computing power to approximate AIXI well enough that it would do anything interesting. Thanks!
This can easily be done, and be done safely, since you could give an AIXI root access to a virtualused machine.
I’m still waiting for evidence that it would do something destructive in the pursuit of a goal that’s is not obviously destructive.