
Sign up to save your podcasts
Or


People talk about model weight security being really hard and crucial around the advent of AGI. (E.g. RAND report, Leopold; see here for some distinctions in these thread models that I think are important.) But I think that the thinking on this has not been sufficiently attentive to the fact that during that crucial time period, by assumption we’ll have access to powerful AIs. I think that such access might make security wildly easier, by a bunch of different mechanisms, some of which I’ll describe in this post.
The story I’m telling here is pretty different from the main story I've heard people talk about in the past about AIs helping with computer security, which is that AIs can help with hardening software and other infrastructure. Though I agree that that seems really useful and important, here [...]
---
Outline:
(02:41) Four strategies for using powerful AI to improve security
(02:46) Monitoring
(03:49) Trust displacement
(04:53) Fine-grained permission management
(06:13) AI investigation of automatically detected suspicious activity
(06:37) How vulnerable to jailbreaks or trickery is this?
(08:51) These techniques seem really powerful
---
First published:
Source:
Narrated by TYPE III AUDIO.
By LessWrongPeople talk about model weight security being really hard and crucial around the advent of AGI. (E.g. RAND report, Leopold; see here for some distinctions in these thread models that I think are important.) But I think that the thinking on this has not been sufficiently attentive to the fact that during that crucial time period, by assumption we’ll have access to powerful AIs. I think that such access might make security wildly easier, by a bunch of different mechanisms, some of which I’ll describe in this post.
The story I’m telling here is pretty different from the main story I've heard people talk about in the past about AIs helping with computer security, which is that AIs can help with hardening software and other infrastructure. Though I agree that that seems really useful and important, here [...]
---
Outline:
(02:41) Four strategies for using powerful AI to improve security
(02:46) Monitoring
(03:49) Trust displacement
(04:53) Fine-grained permission management
(06:13) AI investigation of automatically detected suspicious activity
(06:37) How vulnerable to jailbreaks or trickery is this?
(08:51) These techniques seem really powerful
---
First published:
Source:
Narrated by TYPE III AUDIO.

112,882 Listeners

130 Listeners

7,216 Listeners

533 Listeners

16,223 Listeners

4 Listeners

14 Listeners

2 Listeners