
Sign up to save your podcasts
Or


What if getting strong evidence of scheming isn't the end of your scheming problems, but merely the middle?
In most of our research and writing on AI control, we’ve emphasized the following situation:
For example, in our original paper on AI control, the methodology we used for evaluating safety protocols implies that once the developer is confident that the model is a schemer, they’re totally fine with undeploying the untrusted model.[1][2]
But that seems kind of unlikely. Even if AI companies find strong evidence that their AIs are trying to escape, they won’t necessarily stop deploying them. This might be justified: even a responsible actor might think that [...]
---
Outline:
(03:18) Behavioral observations vs other ways of detecting scheming
(08:29) What does control look like if you need to keep deploying schemers?
(15:06) How does the prospect of needing to deploy known schemers affect the relative value of control research?
(16:56) What research should be done that focuses specifically on this?
(17:02) Sample-efficient ML
(17:27) Training recalcitrant policies
(19:56) A few other historical reasons for focusing on before-you-catch
The original text contained 4 footnotes which were omitted from this narration.
---
First published:
Source:
---
Narrated by TYPE III AUDIO.
---
Images from the article:
Apple Podcasts and Spotify do not show images in the episode description. Try Pocket Casts, or another podcast app.
By LessWrongWhat if getting strong evidence of scheming isn't the end of your scheming problems, but merely the middle?
In most of our research and writing on AI control, we’ve emphasized the following situation:
For example, in our original paper on AI control, the methodology we used for evaluating safety protocols implies that once the developer is confident that the model is a schemer, they’re totally fine with undeploying the untrusted model.[1][2]
But that seems kind of unlikely. Even if AI companies find strong evidence that their AIs are trying to escape, they won’t necessarily stop deploying them. This might be justified: even a responsible actor might think that [...]
---
Outline:
(03:18) Behavioral observations vs other ways of detecting scheming
(08:29) What does control look like if you need to keep deploying schemers?
(15:06) How does the prospect of needing to deploy known schemers affect the relative value of control research?
(16:56) What research should be done that focuses specifically on this?
(17:02) Sample-efficient ML
(17:27) Training recalcitrant policies
(19:56) A few other historical reasons for focusing on before-you-catch
The original text contained 4 footnotes which were omitted from this narration.
---
First published:
Source:
---
Narrated by TYPE III AUDIO.
---
Images from the article:
Apple Podcasts and Spotify do not show images in the episode description. Try Pocket Casts, or another podcast app.

26,354 Listeners

2,455 Listeners

8,498 Listeners

4,167 Listeners

95 Listeners

1,614 Listeners

9,997 Listeners

95 Listeners

519 Listeners

5,522 Listeners

15,815 Listeners

555 Listeners

129 Listeners

92 Listeners

473 Listeners