Hacker Public Radio

HPR4305: My weight and my biases


Listen Later

This show has been flagged as Explicit by the host.

Introduction
  • Greeting and Context
  • Welcome
  • Episode Overview
  • Why This Topic?
  • Ubiquity of AI
  • Ethics Matters for Builders and Hackers
  • Community Responsibility
  • Call to Exploration


    Setting the Stage
    • What We’re Talking About
    • Discussion Centered on Commonly Used AI Applications
    • What We’re Not Covering
    • Historical Perspective
    • Early AI Dreams
    • Modern Realities
    • The Hacker Ethos and Why It Matters
    • Transparency and Openness
    • Ethical Frameworks
    • Empowering the Community


      Transparency and Openness
      • Open Source vs. Proprietary
      • Access to Source Code:
      • Access to Weights, Biases, and Training Methods
      • Training Data
      • Sources of Data
      • Open Datasets vs. Restricted or Proprietary Data
      • Ethical Questions
      • Trade-Offs in Permission and Diversity
      • Openness vs. Misuse


        Legal and Regulatory Dimensions
        • Consent & Permissions
        • Data Usage
        • Global Variations
        • Accountability
        • Liability in AI Systems
        • Corporate vs. Individual Responsibility
        • Regulatory Landscape
        • Different Approaches
        • Balancing Innovation and Control


          Sustainability Concerns
          • Energy Consumption
          • Carbon Footprint of Training and Inference
          • Environmental Impact of Data Centers
          • Future Solutions
          • Efficient Models and Green Data Centers
          • Balancing Innovation with Responsibility


            Bias, Fairness, and Societal Impact
            • Data Bias
            • Discriminatory Outcomes
            • Detection and Mitigation
            • Fairness in Decision-Making
            • Critical Sectors
            • Systemic Impact
            • Social Engineering & Manipulation
            • Influence on Public Opinion
            • Misinformation Risks


              The Addictive Potential of AI and “AI Buddies”
              • Embedded (Often Invisibly) in Social Media
              • Subtle Integration
              • Continuous Engagement Loops
              • AI Buddies and Emotional Dependence
              • Always-On Validation
              • Emotional “Self-Indulgence”
              • AI Agents Doing the “Boring Work”
              • From Assistance to Dependency:
              • Lower Friction, Higher Usage
              • Vulnerable Users and Youth
              • Teens in Crisis
              • Shaping Self-Image
              • Design Choices That Amplify Attachment
              • Human-Like Tones and Expressions
              • Reward Systems and “Leveling Up”
              • Mitigating Risks to Mental and Social Well-Being
              • User Education
              • Ethical Product Design
              • Regulatory Oversight


                Explainability and Trust
                • Transparency of Reasoning
                • Black-Box Challenge
                • Techniques to Enhance Explainability
                • Uncertainty and Confidence Scores
                • Expressing Certainty
                • Importance in Critical Applications


                  Military and Illicit Uses
                  • PsyOps and mass manipulation
                  • AI in Hacking and Phishing:
                  • Automated Social Engineering and Psychological Operations (PsyOps):
                  • Undermining Trust:
                  • Military Applications
                  • Autonomous Weapons and Surveillance
                  • Ethical Implications of Lethal Autonomy


                    Looking Forward
                    • Innovation vs. Caution
                    • Striking a Balance:
                    • Practical Considerations
                    • Adaptive Regulation
                    • Evolving Guidelines
                    • Flexible Frameworks
                    • Community Involvement
                    • Open-Source Contributions
                    • Public Debates and Awareness


                      Thinking like a hacker

                      Preamble:
                      I am not encouraging you to engage in illegal activity. Follow your conscience, obey your curiosity. Take up your responsibility in the world. You be the judge of what that implies.


                      Tinker, Reverse-Engineer, and Learn
                      • Explore Existing Models
                      • Reverse-Engineering Proprietary Systems
                      • DIY Mini-Projects
                        Champion Openness and Transparency
                        • Contribute to Open-Source AI
                        • Push for Open Weights and Data
                        • Engage in Model Auditing
                          Think Critically About Ethics and Privacy
                          • Data Collection Scrutiny
                          • Privacy by Design
                          • Hacker Ethos Meets Ethical AI
                            Collaborate and Share Knowledge
                            • Participate in Hackathons and Research Sprints
                            • Mentorship and Community Engagement
                            • Peer Review and Cross-Pollination
                              Hack the Bias—Literally
                              • Open Audits on Model Bias
                              • Create Bias-Resistant Tools
                                Innovate Responsibly
                                • Experimentation with Purpose
                                • Sustainable Innovation
                                  Stay Vigilant on Addictive and Manipulative Designs
                                  • Critical Examination
                                  • Propose Alternatives
                                    Be the Watchdog—and Sound the Alarm
                                    • Reporting Flaws and Exploits
                                    • Ethical Whistleblowing


                                      Conclusion: Challenge to Think Like a Hacker
                                      • Summation
                                      • Embrace the Hacker Ethos
                                      • Stay Curious, Stay Responsible
                                      • Final Note


                                        Provide feedback on this episode.

                                        ...more
                                        View all episodesView all episodes
                                        Download on the App Store

                                        Hacker Public RadioBy Hacker Public Radio

                                        • 4.2
                                        • 4.2
                                        • 4.2
                                        • 4.2
                                        • 4.2

                                        4.2

                                        34 ratings


                                        More shows like Hacker Public Radio

                                        View all
                                        The Changelog: Software Development, Open Source by Changelog Media

                                        The Changelog: Software Development, Open Source

                                        292 Listeners

                                        Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec by Jerry Bell and Andrew Kalat

                                        Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec

                                        374 Listeners

                                        LINUX Unplugged by Jupiter Broadcasting

                                        LINUX Unplugged

                                        266 Listeners

                                        SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast) by Johannes B. Ullrich

                                        SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

                                        653 Listeners

                                        Curious Cases by BBC Radio 4

                                        Curious Cases

                                        827 Listeners

                                        The Strong Towns Podcast by Strong Towns

                                        The Strong Towns Podcast

                                        426 Listeners

                                        Late Night Linux by The Late Night Linux Family

                                        Late Night Linux

                                        164 Listeners

                                        Darknet Diaries by Jack Rhysider

                                        Darknet Diaries

                                        8,012 Listeners

                                        Cybersecurity Today by Jim Love

                                        Cybersecurity Today

                                        177 Listeners

                                        CISO Series Podcast by David Spark, Mike Johnson, and Andy Ellis

                                        CISO Series Podcast

                                        189 Listeners

                                        TechCrunch Daily Crunch by TechCrunch

                                        TechCrunch Daily Crunch

                                        41 Listeners

                                        Strict Scrutiny by Crooked Media

                                        Strict Scrutiny

                                        5,774 Listeners

                                        2.5 Admins by The Late Night Linux Family

                                        2.5 Admins

                                        97 Listeners

                                        Cyber Security Headlines by CISO Series

                                        Cyber Security Headlines

                                        136 Listeners

                                        What the Hack? by DeleteMe

                                        What the Hack?

                                        222 Listeners