473,700 Members | 2,746 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

How Secure is the Chase for AGI?

3 New Member
The advent of Artificial General Intelligence (AGI) has sparked debates and concerns among experts. Demetrius A. Floudas, an AI policy theorist, emphasizes the critical need for security measures and international regulation in the development of AGI.

The Three Epochs of AI

In his analysis, Floudas introduces a novel classification for the AI epoch, divided into three distinct phases. He terms the current era the 'Protonoëtic' stage, where AI models continue to evolve within specific domains. The forthcoming 'Mesonoëtic' period will see the emergence of AGI, possibly leveraging quantum computing. Finally, the 'Kainonoëtic' epoch will be marked by superintelligen ce capable of recursive self-improvement. Floudas warns that "non-biological sentience will constitute the biggest disruptor in mankind’s history," posing unprecedented challenges to humanity.

Among these risks, one of the immediate concerns highlighted by Floudas is cultural annihilation. AI's ability to create art, music, and literature at a superior and faster rate than humans could undermine traditional creative processes. "Who will choose to spend years composing a symphony when an automaton can deliver the same output in minutes?" Floudas questions.

He also discusses the profound impact AGI could have on personal relationships and daily interactions. He envisions a future where individuals seek fulfillment in AI-generated virtual worlds, with virtual partners offering an idealized companionship that real humans cannot match. This scenario evokes the dystopian vision of individuals living in a "permanent digital stupor," disconnected from real human experiences.

Expert Calls for International Control Treaty

To mitigate these risks, Floudas proposes an AGI Control & Non-Proliferation Treaty, similar to the regulation of nuclear weapons. This treaty would prohibit for-profit AGI development and place all research under the oversight of an international agency with extensive inspection powers. "Non-biological brains of higher capability should be treated similarly to existing Weapons of Mass Destruction," he asserts.

You can read the full interview here.
1 Week Ago #1
0 68

Sign in to post your reply or Sign up for a free account.

Similar topics

by: Billy Jacobs | last post by:
I have a website which has both secure and non-secure pages. I want to uses forms authentication. How do I accomplish this? Originally I had my web.config file in the root with Forms Authentication set up and it worked just fine. Then I realized that I needed to have some pages unsecure. I then created 2 directories. One named Secure and the other named Public. I placed my web.config file in my
by: debedb | last post by:
Hi all, I have a link, <A onClick="javascript:foo()">. The foo() function does w = window.open('', fieldid+'mywindow', prop); w.document.open(); d = w.document; And proceeds to write stuff there.
by: Seth | last post by:
I have noticed that the id of my session object changes when I switch from a non-secure to a secure connection. What I'm trying to do: I have a cookie that is built on the non-secure side of things. What I need to do is to switch to a secure connection and then later on while still in that secure connection delete the cookie that was created on the non- secure side. I need to do this because I can not reference the non-secure cookie...
by: n. Smith | last post by:
Hello, I was wondering if there is any native support in vb.net for connecting to a web server such as IIS 6 using SSL (with a homemade certificate), soley for the purpose of allowing users to upload files to a home directory, without sending login and password details in an unsecure manner. To cut to the chase, I want to setup a webserver, with an SSL certificate, and I would like to develope a client that can connect,
by: sharp2037 | last post by:
Hi Everyone, I am working on an ASP.net application and I have a homepage to which everyone visits of course and on that front page I have a user ID and password box and a login button. What I don't understand is some sites I visit don't use SSL on the login page. Instead you visit the homepage and there is no padlock. Then you type in your user ID and password and then click login and then it redirects to a secure area.
by: info | last post by:
JPMorgan Chase to strengthen offshoring to India http://news.webindia123.com/news/showdetails.asp?id=181952&n_date=20051205&cat=World In yet another instance of international businesses moving operations to India, American banking giant JPMorgan Chase plans to hire 4,500 staff in India over the next two years with an aim to move 30 per cent of its back office and support staff at its investment bank offshore by the end of 2007.
by: Joe | last post by:
I have an application which runs in a non-secure environment. I also have an application that runs in a secure environment (both on the same machine). Is there any way to share the session data for this? Most of the site allows the user to add things to a cart (non-secure), once they choose to check-out, I need this information which was stored in the session to be read by the payment page(secured). Hope this makes sense. It's probably...
by: Robert Seacord | last post by:
The CERT/CC has just deployed a new web site dedicated to developing secure coding standards for the C programming language, C++, and eventually other programming language. We have already developed significant content for the C programming language that is available at: https://www.securecoding.cert.org/ by clicking on the "CERT C Programming Language Secure Coding Standard"
by: amitvps | last post by:
Secure Socket Layer is very important and useful for any web application but it brings some problems too with itself. Handling navigation between secure and non-secure pages is one of the cumbersome jobs. When a non-secure page references a secure page with relative URL, the web server generates error until absolute URL with https prefix is used. On the other hand when a secure page references a non-secure page, the non-secure page will be...
by: tclancey | last post by:
Hi, I'm having a problem with an installed application, apparently the PC locks solid from time to time, seems to be random, but after the lock the following can be found in the application events. Faulting application my-application.exe, version, stamp 463070d8, faulting module gdi32.dll, version 5.1.2600.3099, stamp 45f03054, debug? 0, fault address 0x0003cbd4. Then also get the following when adding a new converter (see...
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can effortlessly switch the default language on Windows 10 without reinstalling. I'll walk you through it. First, let's disable language synchronization. With a Microsoft account, language settings sync across devices. To prevent any complications,...
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed. This is as boiled down as I can make it. Here is my compilation command: g++-12 -std=c++20 -Wnarrowing bit_field.cpp Here is the code in...
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that captivates audiences and drives business growth. The Art of Business Website Design Your website is...
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own.... Now, this would greatly impact the work of software developers. The idea...
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules. He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms. Adolph will...
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols. I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
by: adsilva | last post by:
A Windows Forms form does not have the event Unload, like VB6. What one acts like?
by: muto222 | last post by:
How can i add a mobile payment intergratation into php mysql website.
by: bsmnconsultancy | last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating effective websites that not only look great but also perform exceptionally well. In this comprehensive...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.