Tenoke comments on Risks of downloading alien AI via SETI search - Less Wrong
You are viewing a comment permalink. View the original post to see all comments and the full post content.
You are viewing a comment permalink. View the original post to see all comments and the full post content.
Comments (98)
There are many points that can be nitpicked in the paper but I currently don't have the time. I just want to point out that there will be no possible communication (on a reasonable time scale) with any civilizations which is not in a really close proximity to us so it will be impossible for them to receive further messages from us or ask us anything or to convince us anything or to develop specific strategies for conquering us. In order for them to make this 'seti attack' on a large scale they need to transmit (the same) message as further as they can targeting the average advanced civilization without any feedback. Such an attack is also probably likely only for a really small subset of possible highly-intelligent civilization as there are so many prerequisites.
Also http://en.wikipedia.org/wiki/Self-replicating_spacecraft
They dont need the back communication to start the attack. They need just unstopably translate the same message for many million years. It could look like waste of time, but many Earthly trees sends their seeds without any feedback. It is just reproduction.
Those are some of the examples where you talk about back communication and this is what I was referring to.
Edit:
How?? You seem to again be assuming that there is real-time two-way communication over interstellar distances.
No, I dont assume back communication. They ask about it - but it is only a trick to push us to make their computer. Downloading addititional information could be made from secretive preexisted chanel, like third radiotranslator with highly encripted code.
Fair enough, that could work but there are limitations on this new channel in terms of its position (can't be close to the first signal) and the same limitations for message length. Additionally you need to send the key for the decryption of the second message with the first message.
Surely we will know where the message is originating from and will know how long it will take us to send them a message back and thus they cant trick us into believing that there is backwards communication when there isn't. Especially so when we see that the message stays the same and is repeating itself in every direction.