
Sign up to save your podcasts
Or


Once AI companies build powerful AIs, they may:
In this situation, an internal AI may build an agent scaffold that makes calls to the external API and uses the internal sensitive privileges. Such agent scaffold would be in a better position to cause a catastrophe because it would not be subject to the same monitoring as the internal API. I call this a rogue internal deployment via external APIs. (It is “internal” because the model weights and the agent scaffold never leave the cluster.)
I think preventing those is similarly important from a misalignment perspective as preventing [...]
---
Outline:
(01:43) Rogue internal deployments via external APIs
(03:29) A variation: rogue internal deployments via cross-company APIs
(04:28) A possible mitigation: preventing the creation of scaffolds that use external LLM APIs via monitoring
(06:29) Why I am more pessimistic about other solutions
(06:34) Monitoring the external API
(08:47) Preventing access to external APIs
(10:22) Monitoring access to sensitive permissions
(10:57) Final thoughts
---
First published:
Source:
---
Narrated by TYPE III AUDIO.
---
Images from the article:
Apple Podcasts and Spotify do not show images in the episode description. Try Pocket Casts, or another podcast app.
By LessWrongOnce AI companies build powerful AIs, they may:
In this situation, an internal AI may build an agent scaffold that makes calls to the external API and uses the internal sensitive privileges. Such agent scaffold would be in a better position to cause a catastrophe because it would not be subject to the same monitoring as the internal API. I call this a rogue internal deployment via external APIs. (It is “internal” because the model weights and the agent scaffold never leave the cluster.)
I think preventing those is similarly important from a misalignment perspective as preventing [...]
---
Outline:
(01:43) Rogue internal deployments via external APIs
(03:29) A variation: rogue internal deployments via cross-company APIs
(04:28) A possible mitigation: preventing the creation of scaffolds that use external LLM APIs via monitoring
(06:29) Why I am more pessimistic about other solutions
(06:34) Monitoring the external API
(08:47) Preventing access to external APIs
(10:22) Monitoring access to sensitive permissions
(10:57) Final thoughts
---
First published:
Source:
---
Narrated by TYPE III AUDIO.
---
Images from the article:
Apple Podcasts and Spotify do not show images in the episode description. Try Pocket Casts, or another podcast app.

26,320 Listeners

2,451 Listeners

8,549 Listeners

4,178 Listeners

93 Listeners

1,601 Listeners

9,922 Listeners

95 Listeners

512 Listeners

5,507 Listeners

15,930 Listeners

547 Listeners

130 Listeners

93 Listeners

467 Listeners