‘Cyber Nuclear Bomb’ Logic
42:33–43:43 · 71s
Michael contends that if models are as powerful and risky as companies claim, the Pentagon must scrutinize and constrain them—likening oversight to handling nuclear or bio threats.
42:33–43:43 · 71s
Michael contends that if models are as powerful and risky as companies claim, the Pentagon must scrutinize and constrain them—likening oversight to handling nuclear or bio threats.
We use cookies to understand how you use our platform and to improve your experience. Click "Accept All" to consent, or "Decline non-essential" to opt out of non-essential cookies. Read our Privacy Policy.