You're looking at Less Wrong's discussion board. This includes all posts, including those that haven't been promoted to the front page yet. For more information, see About Less Wrong.

SolveIt comments on What can we learn from Microsoft's Tay, its inflammatory tweets, and its shutdown? - Less Wrong Discussion

1 Post author: InquilineKea 26 March 2016 03:41AM

You are viewing a comment permalink. View the original post to see all comments and the full post content.

Comments (61)

You are viewing a single comment's thread.

Comment author: SolveIt 26 March 2016 05:20:58AM 1 point [-]

I'm sure the engineers knew exactly what would happen. It doesn't tell us much about the control problem that we didn't already know.

OTOH, if this wasn't an intentional PR stunt, that means management didn't think this would happen even though the engineers presumably knew. That definitely has unsettling implications.

Comment author: buybuydandavis 26 March 2016 08:06:46PM 3 points [-]

if this wasn't an intentional PR stunt

I assign very low probability to MSoft wanting a to release a Nazi AI as a PR stunt, or for any other purpose.

Comment author: skeptical_lurker 30 March 2016 06:27:31AM -1 points [-]

All publicity is good... even a Nazi AI? I mean, its obvious that they didn't intentionally make it a Nazi. Maybe one of the engineers wanted to draw attention to AI risk?

Comment author: ChristianKl 26 March 2016 01:40:41PM 2 points [-]

I'm sure the engineers knew exactly what would happen.

Why?

Comment author: The_Jaded_One 26 March 2016 07:16:38PM 2 points [-]

I'm pretty sure they didn't anticipate this happening. Someone at Microsoft Research is getting chewed over for this.

Comment author: buybuydandavis 26 March 2016 08:11:45PM 0 points [-]

I wonder.

It seems like something that could be easily anticipated, and even tested for.

Yet a lot of people just don't take a game theoretic look at problems, and have a hard time conceiving of people with different motivations than they have.

Comment author: ChristianKl 27 March 2016 04:38:06PM *  0 points [-]

It seems like something that could be easily anticipated, and even tested for.

Do anticipate what happened to the bot it would be necessary to predict how people interact with him. How the 4chan crowd interacted with it. That seems hard to test beforehand.

Comment author: buybuydandavis 28 March 2016 02:05:26AM 2 points [-]

That seems hard to test beforehand.

They could have done an internal beta and said "fuck with us". They could have allocated time to a dedicated internal team to do so. Don't they have internal hacking teams to similarly test their security?

Comment author: Lumifer 28 March 2016 01:07:03AM 1 point [-]

How the 4chan crowd interacted with it. That seems hard to test beforehand.

First, no, not hard to test. Second, the 4chan response is entirely predictable.

Comment author: buybuydandavis 28 March 2016 01:58:49AM *  1 point [-]

A Youtube guy, Sargon of Akkad, had an analysis of previous interactive internet promo screwups. A long list. I hadn't heard of them. Microsoft should be in the business of knowing such things.

https://youtu.be/Tv74KIs8I7A?t=14m24s

History should have been enough of an indicator if they couldn't be bothered to do any actual Enemy Team modeling on different populations on the internet that might like to fuck with them.