
Sign up to save your podcasts
Or
What if getting strong evidence of scheming isn't the end of your scheming problems, but merely the middle?
In most of our research and writing on AI control, we’ve emphasized the following situation:
For example, in our original paper on AI control, the methodology we used for evaluating safety protocols implies that once the developer is confident that the model is a schemer, they’re totally fine with undeploying the untrusted model.[1][2]
But that seems kind of unlikely. Even if AI companies find strong evidence that their AIs are trying to escape, they won’t necessarily stop deploying them. This might be justified: even a responsible actor might think that [...]
---
Outline:
(03:18) Behavioral observations vs other ways of detecting scheming
(08:29) What does control look like if you need to keep deploying schemers?
(15:06) How does the prospect of needing to deploy known schemers affect the relative value of control research?
(16:56) What research should be done that focuses specifically on this?
(17:02) Sample-efficient ML
(17:27) Training recalcitrant policies
(19:56) A few other historical reasons for focusing on before-you-catch
The original text contained 4 footnotes which were omitted from this narration.
---
First published:
Source:
Narrated by TYPE III AUDIO.
---
Images from the article:
Apple Podcasts and Spotify do not show images in the episode description. Try Pocket Casts, or another podcast app.
What if getting strong evidence of scheming isn't the end of your scheming problems, but merely the middle?
In most of our research and writing on AI control, we’ve emphasized the following situation:
For example, in our original paper on AI control, the methodology we used for evaluating safety protocols implies that once the developer is confident that the model is a schemer, they’re totally fine with undeploying the untrusted model.[1][2]
But that seems kind of unlikely. Even if AI companies find strong evidence that their AIs are trying to escape, they won’t necessarily stop deploying them. This might be justified: even a responsible actor might think that [...]
---
Outline:
(03:18) Behavioral observations vs other ways of detecting scheming
(08:29) What does control look like if you need to keep deploying schemers?
(15:06) How does the prospect of needing to deploy known schemers affect the relative value of control research?
(16:56) What research should be done that focuses specifically on this?
(17:02) Sample-efficient ML
(17:27) Training recalcitrant policies
(19:56) A few other historical reasons for focusing on before-you-catch
The original text contained 4 footnotes which were omitted from this narration.
---
First published:
Source:
Narrated by TYPE III AUDIO.
---
Images from the article:
Apple Podcasts and Spotify do not show images in the episode description. Try Pocket Casts, or another podcast app.
26,369 Listeners
2,397 Listeners
7,779 Listeners
4,103 Listeners
87 Listeners
1,451 Listeners
8,778 Listeners
89 Listeners
355 Listeners
5,370 Listeners
15,053 Listeners
460 Listeners
126 Listeners
64 Listeners
432 Listeners