You're looking at Less Wrong's discussion board. This includes all posts, including those that haven't been promoted to the front page yet. For more information, see About Less Wrong.

jimrandomh comments on [link] [poll] Future Progress in Artificial Intelligence - Less Wrong Discussion

8 Post author: Pablo_Stafforini 09 July 2014 01:51PM

You are viewing a comment permalink. View the original post to see all comments and the full post content.

Comments (89)

You are viewing a single comment's thread. Show more comments above.

Comment author: jimrandomh 10 July 2014 11:59:31AM 0 points [-]

Right, and I'm saying: the "moments later" part of what Luke said is not something that should be surprising or controversial, given the premises. It does not require any thinking that can't be done in advance, which means the only limiting input is bandwidth, which is both plentiful and becoming more plentiful every year.

Comment author: XiXiDu 10 July 2014 12:53:51PM *  -1 points [-]

Right, and I'm saying: the "moments later" part of what Luke said is not something that should be surprising or controversial, given the premises.

The premise was a superhuman intelligence? I don't see how it could create a large enough botnet, or find enough exploits, in order to be everywhere moments later. Sounds like magic to me (mind you, a complete layman).

If I approximate "superintelligence" as NSA, then I don't see how the NSA could have a trojan everywhere moments after the POTUS asked them to take over the Internet. Now I could go further and imagine the POTUS asking the NSA to take it over within 10 years in order to account for the subjective speed with which a superintelligence might think. But I strongly doubt that such a speed could make up for the data the NSA already possess and which the superintelligence still needs to acquire. It also does not make up for the thousands of drones (humans in meatspace) that the NSA controls. And since the NSA can't take over the Internet within moments I believe it is very extreme to claim that a superintelligence can. Though it might be possible within days.

I hope you don't see this as an attack. I honestly don't see how that could be possible.

Comment author: Lumifer 10 July 2014 02:47:58PM *  3 points [-]

I don't see how the NSA could have a trojan everywhere moments after the POTUS asked them to take over the Internet.

Given a backdoor or an appropriate zero-day exploit, I would estimate that it would take no longer than a few minutes to gain control over most of the computers connected to the 'net if you're not worried about detection. It's not hard. Random people routinely build large botnets without any superhuman abilities.

Comment author: [deleted] 10 July 2014 05:26:21PM 0 points [-]

Most computers are not directly connected to the internet.

Comment author: Lumifer 10 July 2014 05:34:07PM 1 point [-]

Most computers are not directly connected to the internet.

Assuming we are not talking about computers in cars and factory control systems, this is a pretty meaningless statement. Yes, most computers sit behind routers, but then basically all computers on the 'net sit behind routers, no one is "directly" connected.

Besides, routers are computers and can be taken over as well.

Comment author: [deleted] 10 July 2014 06:17:12PM 0 points [-]

But not by that zero-day microsoft exploit you found. If your router is a cisco system, you need a cisco zero-day exploit to access the machines behind it, or some other way of bypassing the firewall. Sure, it could take over all the already vulnerable computers, the same ones which are already compromised by botnets. But I object to calling these "most of the computers connected to the 'net".

Comment author: Lumifer 10 July 2014 06:31:37PM 0 points [-]

But not by that zero-day microsoft exploit you found

The original scenario discussed was the NSA taking over the internet. I assume that the NSA has an extensive collection of backdoors and exploits (cf. Snowden) for Microsoft and Linux and Cisco, etc.

Comment author: [deleted] 10 July 2014 07:07:03PM *  0 points [-]

Yes well I thin XiXiDu did himself a disfavor there. If Snowden is to be believed and as various state-sponsored botnets (Stuxnet, Flame, BadBIOS(?)) have shown, the NSA has already "taken over" the internet. They may not have root access on any arbitrary internet-connected machine, but they could get it if they wanted.

My objection (and his?) is against the claim that an AI could replicate this capability in "moments," according to the "because superhuman!" line of reasoning. I find that bogus.

Comment author: Lumifer 10 July 2014 07:42:10PM *  2 points [-]

My objection (and his?) is against the claim that an AI could replicate this capability in "moments," according to the "because superhuman!" line of reasoning. I find that bogus.

Let me suggest a way:

  • (1) Gain control of a single machine
  • (2) Decompile the OS code
  • (3) Run a security audit on the OS, find exploits

Even easier if the OS is open-sourced.

Comment author: Nornagest 10 July 2014 08:22:50PM *  2 points [-]

An AI probably wouldn't need to decompile anything -- given the kind of optimizations that one could apply, there's no particularly strong reason to think one would be any less comfortable in native machine code or, say, Java bytecode than in source. The only reason we are is that it's closer to natural language and we're bad at keeping track of a lot of disaggregated state.

Comment author: [deleted] 10 July 2014 08:01:26PM *  0 points [-]

That is a monumentally difficult undertaking, unfeasible with current hardware limitations, certainly impossible in the "moments" timescale.

Comment author: jimrandomh 10 July 2014 01:51:25PM 5 points [-]

This is not magic, I am not a layman, and your beliefs about computer security are wildly misinformed. Putting trojans on large fractions of the computers on the internet is currently within the reach of, and is actually done by, petty criminals acting alone. While this does involve a fair amount of thinking time, all of this thinking goes into advance preparation, which could be done while still in an AI-box or in advance of an order.

Comment author: XiXiDu 10 July 2014 05:01:29PM 0 points [-]

This is not magic, I am not a layman, and your beliefs about computer security are wildly misinformed. Putting trojans on large fractions of the computers on the internet is currently within the reach of, and is actually done by, petty criminals acting alone.

Within moments? I don't take your word for this, sorry. The only possibility that comes to my mind is by somehow hacking the Windows update servers and then somehow forcefully install new "updates" without user permission.

While this does involve a fair amount of thinking time, all of this thinking goes into advance preparation, which could be done while still in an AI-box or in advance of an order.

So if I uploaded you onto some alien computer, and you had a billion years of subjective time to think about it, then within moments after you got an "Internet" connection you could put a trojan on most computers of that alien society? How would you e.g. figure out zero day exploits of software that you don't even know exists?

Comment author: Lumifer 10 July 2014 05:38:55PM 3 points [-]

Within moments?

Well, what's going to slow it down? If you have a backdoor or an exploit, to take over a computer requires a few milliseconds for communications latency and a few milliseconds to run the code to execute the takeover. At this point the new zombie becomes a vector for further infection, you have exponential growth and BOOM!

Comment author: Nornagest 10 July 2014 05:27:28PM *  3 points [-]

The only possibility that comes to my mind is by somehow hacking the Windows update servers and then somehow forcefully install new "updates" without user permission.

Wouldn't have to be Windows; any popular software package with live updates would do, like Acrobat or Java or any major antivirus package. Or you could find a vulnerability that allows arbitrary code execution in any popular push notification service; find one in Apache or a comparably popular Web service, then corrupt all the servers you can find; exploit one in a popular browser, if you can suborn something like Google or Amazon's front page... there's lots of stuff you could do. If you have hours instead of moments, phishing attacks and the like become practical, and things get even more fun.

How would you e.g. figure out zero day exploits of software that you don't even know exists?

Well, presumably you're running in an environment that has some nontrivial fraction of that software floating around, or at least has access to repos with it. And there's always fuzzing.

Comment author: Lumifer 10 July 2014 05:41:01PM 2 points [-]

if you can suborn something like Google or Amazon's front page...

Also, nowadays if you can suborn the cell towers taking over all the smartphones becomes fast and easy.

Comment author: jimrandomh 11 July 2014 02:41:20AM 0 points [-]

When you are a layman talking to experts, you should actually listen. Don't make us feel like we're wasting our time.

Comment author: [deleted] 11 July 2014 05:02:17AM 0 points [-]

Care to address his valid response point in the 2nd paragraph?

Comment author: jimrandomh 11 July 2014 01:08:25PM 0 points [-]

Nornagest already answered it; the sets of software in and outside the box aren't disjoint.