Apply to the Conceptual Boundaries Workshop for AI Safety

post by Chipmonk · 2023-11-27T21:04:59.037Z · LW · GW · 0 comments

Contents

  Website, more details, and application
        Apply by December 22
      For identifying, discussing, and strategizing about promising AI safety research directions pertaining to the boundaries that causally distance agents from their environment.
    What are agent boundaries?
      …a natural abstraction for safety?
      Protecting agents and infrastructure
  Attendees
    Confirmed:
    Seeking 4-6 more:
  Questions
  Intended output
  Related work
  Website, more details, and application
        Apply by December 22
  Get notified about future boundaries events
  How you can help
None
No comments

Do you have experience with formal computer security, Active Inference, Embedded Agency, biological gap junctions, or other frameworks that distinguish agents from their environment? Apply to the Conceptual Boundaries Workshop for AI safety. February in Austin TX.

 

Website, more details, and application

Apply by December 22

For identifying, discussing, and strategizing about promising AI safety research directions pertaining to the boundaries that causally distance agents from their environment.

What are agent boundaries?

A few examples:

 

…a natural abstraction for safety?

Agent boundaries seem to be a natural abstraction representing the safety and autonomy of agents.

Maybe the safety of agents could be largely formalized as the preservation of their membranes.

These boundaries can then be formalized via Markov blankets.

Boundaries are also cool because they show a way to respect agents without needing to talk about their preferences or utility functions. Andrew Critch has said the following about this idea:

my goal is to treat boundaries as more fundamental than preferences, rather than as merely a feature of them.  In other words, I think boundaries are probably better able to carve reality at the joints than either preferences or utility functions, for the purpose of creating a good working relationship between humanity and AI technology («Boundaries» Sequence, Part 3b [? · GW])

For instance, respecting the boundary of a bacterium would probably mean “preserving or not disrupting its membrane” (as opposed to knowing its preferences and satisfying them).

Protecting agents and infrastructure

By formalizing and preserving the important boundaries in the world, we could be in a better position to protect humanity from AI threats.

For example, critical computing infrastructure could be secured by creating strong boundaries around them. This can be enforced by cryptography and formal methods such that only the subprocesses that need to have read and/or write access to a particular resource (like memory) have the encryption keys to do so. Related: Object-capability model, Principle of least privilege, Evan Miyazono’s Atlas Computing, Davidad’s Open Agency Architecture [? · GW].

 

And it may also be possible to do something similar with physical property rights.

Attendees

Confirmed:

Seeking 4-6 more:

Do you have experience with formal computer security, Active Inference, Embedded Agency, biological gap junctions, or other frameworks that distinguish agents from their environment?

Note: We will likely be running larger boundaries workshops in mid 2024, even if there isn’t space for you at this February workshop.

Questions

Intended output

To identify promising research directions and empirical projects for formalizing boundaries and applying boundaries to safety.

For example, what would be needed to specify a formal language for describing boundaries-based ethics?

Related work


Website, more details, and application

Apply by December 22

Conceptual Boundaries Workshop is financially supported by the Foresight Institute, Blake Borgeson, and LTFF.

Get notified about future boundaries events

We are also considering running other boundaries-related workshops in mid 2024. For example a larger more general workshop, or domain-specific workshops (e.g.: boundaries in biology, boundaries in computer security). If you would like to get notified about potential future events, sign up via the form on the footer of the website.

How you can help

0 comments

Comments sorted by top scores.