
Sign up to save your podcasts
Or
People talk about model weight security being really hard and crucial around the advent of AGI. (E.g. RAND report, Leopold; see here for some distinctions in these thread models that I think are important.) But I think that the thinking on this has not been sufficiently attentive to the fact that during that crucial time period, by assumption we’ll have access to powerful AIs. I think that such access might make security wildly easier, by a bunch of different mechanisms, some of which I’ll describe in this post.
The story I’m telling here is pretty different from the main story I've heard people talk about in the past about AIs helping with computer security, which is that AIs can help with hardening software and other infrastructure. Though I agree that that seems really useful and important, here [...]
---
Outline:
(02:41) Four strategies for using powerful AI to improve security
(02:46) Monitoring
(03:49) Trust displacement
(04:53) Fine-grained permission management
(06:13) AI investigation of automatically detected suspicious activity
(06:37) How vulnerable to jailbreaks or trickery is this?
(08:51) These techniques seem really powerful
---
First published:
Source:
Narrated by TYPE III AUDIO.
People talk about model weight security being really hard and crucial around the advent of AGI. (E.g. RAND report, Leopold; see here for some distinctions in these thread models that I think are important.) But I think that the thinking on this has not been sufficiently attentive to the fact that during that crucial time period, by assumption we’ll have access to powerful AIs. I think that such access might make security wildly easier, by a bunch of different mechanisms, some of which I’ll describe in this post.
The story I’m telling here is pretty different from the main story I've heard people talk about in the past about AIs helping with computer security, which is that AIs can help with hardening software and other infrastructure. Though I agree that that seems really useful and important, here [...]
---
Outline:
(02:41) Four strategies for using powerful AI to improve security
(02:46) Monitoring
(03:49) Trust displacement
(04:53) Fine-grained permission management
(06:13) AI investigation of automatically detected suspicious activity
(06:37) How vulnerable to jailbreaks or trickery is this?
(08:51) These techniques seem really powerful
---
First published:
Source:
Narrated by TYPE III AUDIO.
26,462 Listeners
2,395 Listeners
7,928 Listeners
4,142 Listeners
89 Listeners
1,472 Listeners
9,189 Listeners
88 Listeners
417 Listeners
5,448 Listeners
15,237 Listeners
481 Listeners
121 Listeners
75 Listeners
461 Listeners