My commentary is my blog in ascending (date) order. I wrote some blog posts after I finished a previous one. It might be easier to relate to that post easier if you have read or at least acknowledge its predecessor.
Thinking about Artificial Superintelligence (ASI) and its Safety is darn difficult. The normal objection would be: "We don't even know where to start without wild speculation". We don't have a specific product or a limited class of products in which its safety can be discussed, and we have only our...
Cryptography and computer security have established approaches to deal with "acceptable types of threats" in their domain of expertise. Unfortunately, cryptography is not considering a super-smart software that stealing keys effortlessly on the sender or receiving system. Similarly, computer security is quite silent about the threat from reverse code engineering...
We are living in politically divided nations and in a divided and segregated world. All nations are sovereign entities. They have supreme control over their territory, and therefore the final word on their governing laws. Many countries, the middle and superpowers, are starting to get very concerned about their national...