Hacker Public Radio

HPR4305: My weight and my biases


Listen Later

This show has been flagged as Explicit by the host.

Introduction
  • Greeting and Context
  • Welcome
  • Episode Overview
  • Why This Topic?
  • Ubiquity of AI
  • Ethics Matters for Builders and Hackers
  • Community Responsibility
  • Call to Exploration


    Setting the Stage
    • What We’re Talking About
    • Discussion Centered on Commonly Used AI Applications
    • What We’re Not Covering
    • Historical Perspective
    • Early AI Dreams
    • Modern Realities
    • The Hacker Ethos and Why It Matters
    • Transparency and Openness
    • Ethical Frameworks
    • Empowering the Community


      Transparency and Openness
      • Open Source vs. Proprietary
      • Access to Source Code:
      • Access to Weights, Biases, and Training Methods
      • Training Data
      • Sources of Data
      • Open Datasets vs. Restricted or Proprietary Data
      • Ethical Questions
      • Trade-Offs in Permission and Diversity
      • Openness vs. Misuse


        Legal and Regulatory Dimensions
        • Consent & Permissions
        • Data Usage
        • Global Variations
        • Accountability
        • Liability in AI Systems
        • Corporate vs. Individual Responsibility
        • Regulatory Landscape
        • Different Approaches
        • Balancing Innovation and Control


          Sustainability Concerns
          • Energy Consumption
          • Carbon Footprint of Training and Inference
          • Environmental Impact of Data Centers
          • Future Solutions
          • Efficient Models and Green Data Centers
          • Balancing Innovation with Responsibility


            Bias, Fairness, and Societal Impact
            • Data Bias
            • Discriminatory Outcomes
            • Detection and Mitigation
            • Fairness in Decision-Making
            • Critical Sectors
            • Systemic Impact
            • Social Engineering & Manipulation
            • Influence on Public Opinion
            • Misinformation Risks


              The Addictive Potential of AI and “AI Buddies”
              • Embedded (Often Invisibly) in Social Media
              • Subtle Integration
              • Continuous Engagement Loops
              • AI Buddies and Emotional Dependence
              • Always-On Validation
              • Emotional “Self-Indulgence”
              • AI Agents Doing the “Boring Work”
              • From Assistance to Dependency:
              • Lower Friction, Higher Usage
              • Vulnerable Users and Youth
              • Teens in Crisis
              • Shaping Self-Image
              • Design Choices That Amplify Attachment
              • Human-Like Tones and Expressions
              • Reward Systems and “Leveling Up”
              • Mitigating Risks to Mental and Social Well-Being
              • User Education
              • Ethical Product Design
              • Regulatory Oversight


                Explainability and Trust
                • Transparency of Reasoning
                • Black-Box Challenge
                • Techniques to Enhance Explainability
                • Uncertainty and Confidence Scores
                • Expressing Certainty
                • Importance in Critical Applications


                  Military and Illicit Uses
                  • PsyOps and mass manipulation
                  • AI in Hacking and Phishing:
                  • Automated Social Engineering and Psychological Operations (PsyOps):
                  • Undermining Trust:
                  • Military Applications
                  • Autonomous Weapons and Surveillance
                  • Ethical Implications of Lethal Autonomy


                    Looking Forward
                    • Innovation vs. Caution
                    • Striking a Balance:
                    • Practical Considerations
                    • Adaptive Regulation
                    • Evolving Guidelines
                    • Flexible Frameworks
                    • Community Involvement
                    • Open-Source Contributions
                    • Public Debates and Awareness


                      Thinking like a hacker

                      Preamble:
                      I am not encouraging you to engage in illegal activity. Follow your conscience, obey your curiosity. Take up your responsibility in the world. You be the judge of what that implies.


                      Tinker, Reverse-Engineer, and Learn
                      • Explore Existing Models
                      • Reverse-Engineering Proprietary Systems
                      • DIY Mini-Projects
                        Champion Openness and Transparency
                        • Contribute to Open-Source AI
                        • Push for Open Weights and Data
                        • Engage in Model Auditing
                          Think Critically About Ethics and Privacy
                          • Data Collection Scrutiny
                          • Privacy by Design
                          • Hacker Ethos Meets Ethical AI
                            Collaborate and Share Knowledge
                            • Participate in Hackathons and Research Sprints
                            • Mentorship and Community Engagement
                            • Peer Review and Cross-Pollination
                              Hack the Bias—Literally
                              • Open Audits on Model Bias
                              • Create Bias-Resistant Tools
                                Innovate Responsibly
                                • Experimentation with Purpose
                                • Sustainable Innovation
                                  Stay Vigilant on Addictive and Manipulative Designs
                                  • Critical Examination
                                  • Propose Alternatives
                                    Be the Watchdog—and Sound the Alarm
                                    • Reporting Flaws and Exploits
                                    • Ethical Whistleblowing


                                      Conclusion: Challenge to Think Like a Hacker
                                      • Summation
                                      • Embrace the Hacker Ethos
                                      • Stay Curious, Stay Responsible
                                      • Final Note


                                        Provide feedback on this episode.

                                        ...more
                                        View all episodesView all episodes
                                        Download on the App Store

                                        Hacker Public RadioBy Hacker Public Radio

                                        • 4.2
                                        • 4.2
                                        • 4.2
                                        • 4.2
                                        • 4.2

                                        4.2

                                        34 ratings


                                        More shows like Hacker Public Radio

                                        View all
                                        Security Now (Audio) by TWiT

                                        Security Now (Audio)

                                        1,971 Listeners

                                        Off The Hook by 2600 Enterprises

                                        Off The Hook

                                        117 Listeners

                                        No Agenda Show by Adam Curry & John C. Dvorak

                                        No Agenda Show

                                        5,938 Listeners

                                        The Changelog: Software Development, Open Source by Changelog Media

                                        The Changelog: Software Development, Open Source

                                        283 Listeners

                                        LINUX Unplugged by Jupiter Broadcasting

                                        LINUX Unplugged

                                        265 Listeners

                                        BSD Now by JT Pennington

                                        BSD Now

                                        89 Listeners

                                        Open Source Security by Josh Bressers

                                        Open Source Security

                                        43 Listeners

                                        Late Night Linux by The Late Night Linux Family

                                        Late Night Linux

                                        154 Listeners

                                        The Linux Cast by The Linux Cast

                                        The Linux Cast

                                        35 Listeners

                                        Darknet Diaries by Jack Rhysider

                                        Darknet Diaries

                                        7,864 Listeners

                                        This Week in Linux by TuxDigital Network

                                        This Week in Linux

                                        36 Listeners

                                        Linux Dev Time by The Late Night Linux Family

                                        Linux Dev Time

                                        21 Listeners

                                        Hacking Humans by N2K Networks

                                        Hacking Humans

                                        314 Listeners

                                        2.5 Admins by The Late Night Linux Family

                                        2.5 Admins

                                        92 Listeners

                                        Linux Matters by Linux Matters

                                        Linux Matters

                                        20 Listeners