The techniques are useful, in and of themselves, without having to think about utility in creating a friendly AI.
So, yes, by all means, work on better skills.
But—the point I’m trying to make is that while they may help, they are insufficient to provide any real degree of confidence in preventing the creation of an unfriendly AI, because the emergent effects that would likely be responsible for such are not amenable to planning about ahead of time.
It seems to me your original proposal is the logical equivalent to “Hey, if we can figure out how to better predict where lightning strikes—we could go there ahead of time and be ready to stop the fires quickly, before the spread”. Well, sure—except that sort of prediction would depend on knowing ahead of time the outcome of very unpredictable events (“where, exactly, will the lightning strike?”) - and it would be far more practical to spend the time and effort on things like lightning rods and firebreaks.
But—the point I’m trying to make is that while they may help, they are insufficient to provide any real degree of confidence in preventing the creation of an unfriendly AI
Basically you attack a strawman.
and it would be far more practical to spend the time and effort on things like lightning rods and firebreaks.
Unfortunately I don’t think anybody has proposed an idea of how to solve FAI that’s as straightforward as building lighting rods.
In computer security there the idea of “defense in depth”. You try to get every layer right and as secure as possible.
″… idea for an indirect strategy to increase the likelihood of society acquiring robustly safe and beneficial AI.” is what you said. I said preventing the creation of an unfriendly AI.
Ok. valid point. Not the same.
I would say the items described will do nothing whatsoever to “increase the likelihood of society acquiring robustly safe and beneficial AI.”
They are certainly of value in normal software development, but it seems increasingly likely as time passes without a proper general AI actually being created that such a task is far, far more difficult than anyone expected, and that if one does come into being, it will happen in a manner other than the typical software development process as we do things today. It will be an incremental process of change and refinement seeking a goal, is my guess. Starting from a great starting point might presumably reduce the iterations a bit, but other than a head start toward the finish line, I cannot imagine it would affect the course much.
If we drop single cell organisms on a terraformed planet, and come back a hundred million years or so—we might well expect to find higher life forms evolved from it, but finding human beings is basically not gonna happen. If we repeat that—same general outcome (higher life forms), but wildly differing specifics. The initial state of the system ends up being largely unimportant—what matters is evolution, the ability to reproduce, mutate and adapt. Direction during that process could well guide it—but the exact configuration of the initial state (the exact type of organisms we used as a seed) is largely irrelevant.
re. Computer security—I actually do that for a living. Small security rant—my apologies:
You do not actually try to get every layer “as right and secure as possible.” The whole point of defense in depth is that any given security measure can fail, so to ensure protection, you use multiple layers of different technologies so that when (not if) one layer fails, the other layers are there to “take up the slack”, so to speak.
The goal on each layer is not “as secure as possible”, but simply “as secure as reasonable” (you seek a “sweet spot” that balances security and other factors like cost), and you rely on the whole to achieve the goal. Considerations include cost to implement and maintain, the value of what you are protecting, the damage caused should security fail, who your likely attackers will be and their technical capabilities, performance impact, customer impact, and many other factors.
Additionally, security costs at a given layer do not increase linearly, so making a given layer more secure, while often possible, quickly becomes inefficient. Example—Most websites use a 2k SSL key; 4k is more secure, and 8k is even moreso. Except − 8k doesn’t work everywhere, and the bigger keys come with a performance impact that matters at scale—and the key size is usually not the reason a key is compromised. So—the entire world (for the most part) does not use the most secure option, simply because it’s not worth it—the additional security is swamped by the drawbacks. (Similar issues occur regarding cipher choice, fwiw).
In reality—in nearly all situations, human beings are the weak link. You can have awesome security, and all it takes is one bozo and it all comes down. SSL is great, until someone manages to get a key signed fraudulently, and bypasses it entirely. Packet filtering is dandy, except that fred in accounting wanted to play minecraft and opened up a ssh tunnel, incorrectly. MFA is fine, except the secretary who logged into the VPN using MFA just plugged the thumb drive they found in the parking lot into per PC, and actually ran “Elf Bowling”, and now your AD is owned and the attacker is escalating privledge from inside. so it doesn’t matter that much about your hard candy shell, he’s in the soft, chewy center. THIS, by the way, is where things like education are of the most value—not in making the very skilled more skilled, but in making the clueless somewhat more clueful. If you want to make a friendly AI—remove human beings from the loop as much as possible...
Ok, done with rant. Again, sorry—I live this 40-60 hours a week.
The techniques are useful, in and of themselves, without having to think about utility in creating a friendly AI.
So, yes, by all means, work on better skills.
But—the point I’m trying to make is that while they may help, they are insufficient to provide any real degree of confidence in preventing the creation of an unfriendly AI, because the emergent effects that would likely be responsible for such are not amenable to planning about ahead of time.
It seems to me your original proposal is the logical equivalent to “Hey, if we can figure out how to better predict where lightning strikes—we could go there ahead of time and be ready to stop the fires quickly, before the spread”. Well, sure—except that sort of prediction would depend on knowing ahead of time the outcome of very unpredictable events (“where, exactly, will the lightning strike?”) - and it would be far more practical to spend the time and effort on things like lightning rods and firebreaks.
Basically you attack a strawman.
Unfortunately I don’t think anybody has proposed an idea of how to solve FAI that’s as straightforward as building lighting rods.
In computer security there the idea of “defense in depth”. You try to get every layer right and as secure as possible.
Strawman?
″… idea for an indirect strategy to increase the likelihood of society acquiring robustly safe and beneficial AI.” is what you said. I said preventing the creation of an unfriendly AI.
Ok. valid point. Not the same.
I would say the items described will do nothing whatsoever to “increase the likelihood of society acquiring robustly safe and beneficial AI.”
They are certainly of value in normal software development, but it seems increasingly likely as time passes without a proper general AI actually being created that such a task is far, far more difficult than anyone expected, and that if one does come into being, it will happen in a manner other than the typical software development process as we do things today. It will be an incremental process of change and refinement seeking a goal, is my guess. Starting from a great starting point might presumably reduce the iterations a bit, but other than a head start toward the finish line, I cannot imagine it would affect the course much.
If we drop single cell organisms on a terraformed planet, and come back a hundred million years or so—we might well expect to find higher life forms evolved from it, but finding human beings is basically not gonna happen. If we repeat that—same general outcome (higher life forms), but wildly differing specifics. The initial state of the system ends up being largely unimportant—what matters is evolution, the ability to reproduce, mutate and adapt. Direction during that process could well guide it—but the exact configuration of the initial state (the exact type of organisms we used as a seed) is largely irrelevant.
re. Computer security—I actually do that for a living. Small security rant—my apologies:
You do not actually try to get every layer “as right and secure as possible.” The whole point of defense in depth is that any given security measure can fail, so to ensure protection, you use multiple layers of different technologies so that when (not if) one layer fails, the other layers are there to “take up the slack”, so to speak.
The goal on each layer is not “as secure as possible”, but simply “as secure as reasonable” (you seek a “sweet spot” that balances security and other factors like cost), and you rely on the whole to achieve the goal. Considerations include cost to implement and maintain, the value of what you are protecting, the damage caused should security fail, who your likely attackers will be and their technical capabilities, performance impact, customer impact, and many other factors.
Additionally, security costs at a given layer do not increase linearly, so making a given layer more secure, while often possible, quickly becomes inefficient. Example—Most websites use a 2k SSL key; 4k is more secure, and 8k is even moreso. Except − 8k doesn’t work everywhere, and the bigger keys come with a performance impact that matters at scale—and the key size is usually not the reason a key is compromised. So—the entire world (for the most part) does not use the most secure option, simply because it’s not worth it—the additional security is swamped by the drawbacks. (Similar issues occur regarding cipher choice, fwiw).
In reality—in nearly all situations, human beings are the weak link. You can have awesome security, and all it takes is one bozo and it all comes down. SSL is great, until someone manages to get a key signed fraudulently, and bypasses it entirely. Packet filtering is dandy, except that fred in accounting wanted to play minecraft and opened up a ssh tunnel, incorrectly. MFA is fine, except the secretary who logged into the VPN using MFA just plugged the thumb drive they found in the parking lot into per PC, and actually ran “Elf Bowling”, and now your AD is owned and the attacker is escalating privledge from inside. so it doesn’t matter that much about your hard candy shell, he’s in the soft, chewy center. THIS, by the way, is where things like education are of the most value—not in making the very skilled more skilled, but in making the clueless somewhat more clueful. If you want to make a friendly AI—remove human beings from the loop as much as possible...
Ok, done with rant. Again, sorry—I live this 40-60 hours a week.