noodling on a blog post - does anyone with more experience of LW/EA than me know if "AI safety" people are referencing the invention of nuclear weapons as a template for regulating/forbidding "AGI"?
TechTakes
Big brain tech dude got yet another clueless take over at HackerNews etc? Here's the place to vent. Orange site, VC foolishness, all welcome.
This is not debate club. Unless it’s amusing debate.
For actually-good tech, you want our NotAwfulTech community
A notable article from our dear friend Nick Bostrom mentions the atmospheric auto-ignition story:
https://nickbostrom.com/papers/vulnerable.pdf
Type-0 (‘surprising strangelets’): In 1942, it occurred to Edward Teller, one of the Manhattan scientists, that a nuclear explosion would create a temperature unprecedented in Earth’s history, producing conditions similar to those in the center of the sun, and that this could conceivably trigger a self-sustaining thermonuclear reaction in the surrounding air or water (Rhodes, 1986).
(this goes on for a number of paragraphs)
This whole article has some wild stuff if you haven't seen it before BTW, so buckle up. He also mentions this story in https://nickbostrom.com/existential/risks and https://existential-risk.com/concept.pdf if you want older examples.
I'd be surprised if Eliezer hasn't mentioned it at some point, maybe more in the way that you're after. Can't find any examples though.
In his Times article the only place he mentions nukes is what we should do to countries that have too many GPUs: https://time.com/6266923/ai-eliezer-yudkowsky-open-letter-not-enough/
Edit: Not Mr. Yudkowski but see https://futureoflife.org/document/policymaking-in-the-pause/
“The time for saying that this is just pure research has long since passed. […] It’s in no country’s interest for any country to develop and release AI systems we cannot control. Insisting on sensible precautions is not anti-industry. Chernobyl destroyed lives, but it also decimated the global nuclear industry. I’m an AI researcher. I do not want my field of research destroyed. Humanity has much to gain from AI, but also everything to lose.”
“Let’s slow down. Let’s make sure that we develop better guardrails, let’s make sure that we discuss these questions internationally just like we’ve done for nuclear power and nuclear weapons. Let’s make sure we better understand these very large systems, that we improve on their robustness and the process by which we can audit them and verify that they are safe for the public.”
When they mention AI guardrails, they mean so it does become racist, spamming, abusive and based on the largest abuse of the cultural sector since spotify right?
Right?
I’m an AI researcher
*jerking off motion*
choose your silicon valley thinkboi
edit: goddammit istewart got in first because we both saw this on the zitron discord
via this I just learned that google's about[0] to open the taps on fingerprinting allowance for advertisers
that'll go well.
I realize that a lot of people in the rtb space already spend an utterly obscene amount of effort and resources to try do this shit in the first place, but jesus, this isn't even pretending. guess their projections for ad revenue must be looking real scary!
edit [0] - "about", as in next month. and they announced it last month.
The Google post appears to be Updating our platform policies to reflect innovations in the ads ecosystem.
I have no idea what the heck those words mean (it appears to be some bizarro form of English), so I diffed the policy itself. Here are the parts I found notable.
This will be removed:
You must not use device fingerprints or locally shared objects (e.g., Flash cookies, Browser Helper Objects, HTML5 local storage) other than HTTP cookies, or user-resettable mobile device identifiers designed for use in advertising, in connection with Google's platform products. This does not limit the use of IP address for the detection of fraud.
This will be removed:
You must not pass any information to Google [...] that permanently identifies a particular device (such as a mobile phone's unique device identifier if such an identifier cannot be reset).
This will be added:
You must disclose clearly any data collection, sharing and usage that takes place in connection with your use of Google products, including information about the technologies used, such as your use of cookies, web beacons, IP addresses, or other identifiers. This applies for data collection, sharing and usage on any platform, surface or property (e.g., web, app, Connected TV, gaming console or email publication).
you just gotta love how vacuously pointless the wording is
You must disclose
google-rfc "must": "we want something we can bend you over a barrel with if you're caught out by one, but that's all we'll bother committing because otherwise it eats into our lovely extortion profits"
Also I'm having a fun time imagining an accurate device fingerprinting disclosure from someone who was really really thorough.
Not-A-Cookie-I-Swear Technologies LTD may collect the following information:
Don't worry none of it is a cookie :D
- Your User-Agent
- Your browsers language / locale
- The state of the service-worker associated with Not-A-Cookie-I-Swear Technologies LTD's website
- Whether your "mouse" movements look more like a mouse, trackpoint, gamepad, joystick or touchscreen according to our heuristics
- The current JavaScript time
- Whether your browser prefers dark mode or not
- Whether your browser reports itself as screen or print media
- The device size, device pixel ratio, frame size, and frame position reported by your browser
- Your browser's HTTP request headers
- The success or failure of fetching a URL included in the Easylist ad-block list
- Whether or not an element associated with the Easylist element hiding list was hidden or not
- Your IP address
- The result of tracerouting your IP address from one of our servers
- Browser Local and/or Session Storage
- The state of the WebSQL and/or IndexedDB database for our website
- The state of the OPFS filesystem store associated with our website
- Whether or not there was an HTTP cache hit for our website
- Whether or not there was a DNS entry cached for our website
- A hash of the pixels in a WebGL and/or WebGPU scene
- The browser's default styling
- The browser's minimum font size
- The browser's default font family
- The font file chosen for a variety of character (or ligature) and font-family combinations
- A hash of the pixels of a canvas with a variety of font families and shapes written into it
- A report on the presence or absence of various browser CVEs in your browser
- Information about any other open tabs that happen to include technologies from Not-A-Cookie-I-Swear Technologies LTD
- What video, audio, and/or image codecs are supported by your browser
- Whether or not your browser enables video auto play (and whether or not it's muted by default)
- Whether your browser supports MathGL or not
- Whether your browser recognizes any origin trials that Not-A-Cookie-I-Swear Technologies LTD happens to have opted into at any given time
- The behavior of your browser against various web standards edge cases or the presence or absense of features in draft web standards (e.g. Web Platform Tests or Can-I-Use tests)
- Whether or not your browser supports Widevine video DRM
- Various browser performance characteristics
- All key press events
- Various form auto-fill data (if triggered)
- Any mouse down, mouse move, or mouse up events
- A rough geolocation calculated by examining the relative latency of fetches to a number of geographically distributed web servers
- The presence or absence of various browser plugins developed by, purchased by, or affilated with Not-A-Cookie-I-Swear Technlogies LTD (and any data therein as agreed to by the extension permissions dialog -- up to and including microphone, webcam, or full page DOM)
Some stuff in this list is me being silly, but overall it shows that the talk about "privacy-enhancing technologies" is premature on the web platform. The web has been trying to have better privacy defaults over time; but there's a long legacy of features from before this was considered as much, as well as Google tossing around their weight in the web standards and browser space.
now i wonder how much of that is blocked by firefox enhanced tracking protection. not all, of course, and it's probably much more than needed for unique identifier. there's mozilla security blog post on this topic says that some anti-fingerprinting measures were built in all the way back in 2020 (firefox 72)
Above I listed a bunch of things which would help narrow down browser version, but that's hopeless anyway -- an adversary will probably be able to figure out your rough browser version even if you fake the UA string, and that you're running in anti-fingerprinting mode.
So assuming that's out of scope I think these are probably the big categories:
- Normalize any system information presented to webpage (e.g. remove minor version from UA header, remove OS from UA header, etc)
- Canvas, WebGL, and WebGPU need to be implemented in software in a deterministic way. Similarly any compositing (including stuff like font shaping, SVG rendering, page layout) must be done in software (prevent GPU fingerprinting)
- A fixed font set must be used rather than using the system font set (prevent fingerprinting font enthusiasts)
- The device size / frame size (and position) must be lied about (e.g. rounded to a common resolution or a multiple of 100px), and layout adjusted appropriately (Mozilla calls this "Letterboxing") (prevent fingerprinting psychos who don't run their browser in fullscreen mode).
- Page storage should be disabled or cleared (local / session storage, cookies, service workers, indexeddb, etc) (A cookie by any other name would taste as sweet)
- Caching is a big problem, probably have to disable it entirely (including HTTP caching, HTTP caching at the ISP level*, DNS lookups, favicons, JavaScript compilation cache) (Pesky pesky global state).
- Performance metrics are another big problem. Disabling JavaScript would go a long way here but you probably can't prevent them entirely unless you're prepared to go to unhealthy extremes** (this is like the past 10 years of cutting edge security research so we're doomed)
- Disable any plugins or other customizations which may provide a fingerprint accessible to the webpage (oops it turned out the FBI caught me because I configured my browser to inject pictures of cute bunnies into every webpage).
- And of course IP address, which you presumably want to do something about (proxy?)
That said while I've worked with browsers, I'm not in the biz of fingerprinting or anti-fingerprinting, so there's surely stuff I haven't thought of.
* Actually we should probably just disable non-HTTPS entirely...
** Running under a VM is probably the minimum required to mitigate the chances of cutting-edge side-channel timing attacks from James Bond level adversaries, but at that point maybe you just want a dedicated browsing computer heh. I did chuckle at the idea of someone trying to apply cryptographic constant-time algorithm techniques to writing a browser though.
Is the brain just a computer By Iris van Rooij, a psychologist and cognitive scientist (and she is also a bit skeptical about the claims about AI). Might be an interesting read for the people here.