You can login if you already have an account or register by clicking the button below.
Registering is free and all you need is a username and password. We never ask you for your e-mail.
[+]jxfaith0 points4 points4 points
ago
(edited ago)
[–]jxfaith0 points
4 points
4 points
(+4|-0)
ago
(edited ago)
The only problem is that the thing is programmed by people of course, so we cannot know for sure if it'll be 100% free of prejudice or dirty tricks
That depends on the techniques employed in creating the AI. If it's a neural network, it's incredibly unlikely that a human can even understand, let alone directly alter its programming.
It will require some kind of programming. They can't put an AI down and expect it to start running a nation by instinct. And even if they can't alter the programming, they can restrict the input so it gets so it will make decisions based on bad information. There will always be ways people can fuck with it. No system is 100% safe.
[+]jxfaith0 points2 points2 points
ago
(edited ago)
[–]jxfaith0 points
2 points
2 points
(+2|-0)
ago
(edited ago)
Definitely. Such manipulations would be superficial to the neural network, however, and should be detectable in source code if it were vetted by a third party.
view the rest of the comments →
[–] jxfaith 0 points 4 points 4 points (+4|-0) ago (edited ago)
That depends on the techniques employed in creating the AI. If it's a neural network, it's incredibly unlikely that a human can even understand, let alone directly alter its programming.
[–] BottomLine 0 points 3 points 3 points (+3|-0) ago
It will require some kind of programming. They can't put an AI down and expect it to start running a nation by instinct. And even if they can't alter the programming, they can restrict the input so it gets so it will make decisions based on bad information. There will always be ways people can fuck with it. No system is 100% safe.
[–] jxfaith 0 points 2 points 2 points (+2|-0) ago (edited ago)
Definitely. Such manipulations would be superficial to the neural network, however, and should be detectable in source code if it were vetted by a third party.