Go Back
Choose this branch
Choose this branch
meritocratic
regular
democratic
hot
top
alive
39 posts
Computer Science
Nanotechnology
Moore's Law
Compute
Transformative AI
32 posts
Computer Security & Cryptography
Trust and Reputation
Security Mindset
61
AGI Timelines in Governance: Different Strategies for Different Timeframes
simeon_c
1d
14
20
The No Free Lunch theorem for dummies
Steven Byrnes
15d
16
7
[Incomplete] What is Computation Anyway?
DragonGod
6d
1
91
Avoid the abbreviation "FLOPs" – use "FLOP" or "FLOP/s" instead
Daniel_Eth
5mo
12
6
What are the Limits on Computability?
DragonGod
4mo
2
6
FAI FAQ draft: What is nanotechnology?
lukeprog
11y
23
23
Total Nano Domination
Eliezer Yudkowsky
14y
23
22
What I got out of 'Algorithms to Live By'
rk
4y
1
18
What is the evidence on the Church-Turing Thesis?
Morpheus
1y
18
23
Slowing Moore's Law: Why You Might Want To and How You Would Do It
gwern
10y
90
12
Compute Research Questions and Metrics - Transformative AI and Compute [4/4]
lennart
1y
0
17
Quantum computing for the determined (Link)
XiXiDu
11y
5
23
Use-cases for computations, other than running them?
johnswentworth
2y
6
25
Compute Governance and Conclusions - Transformative AI and Compute [3/4]
lennart
1y
0
162
Secure homes for digital people
paulfchristiano
1y
40
15
Hacker-AI – Does it already exist?
Erland Wittkotter
1mo
11
27
Was is good Cyber Security Advice?
Gunnar_Zarncke
1mo
12
33
Deepfake(?) Phishing
jefftk
2mo
9
24
"Just hiring people" is sometimes still actually possible
lc
4mo
11
389
Security Mindset: Lessons from 20+ years of Software Security Failures Relevant to AGI Alignment
elspood
6mo
40
107
Security Mindset and Ordinary Paranoia
Eliezer Yudkowsky
5y
24
11
Reestablishing Reliable Sources: A System for Tagging URLs
Riley Mueller
19d
1
301
Six Dimensions of Operational Adequacy in AGI Projects
Eliezer Yudkowsky
6mo
65
23
Unikernels: No Longer an Academic Exercise
Martin Sustrik
4y
1
19
How good is security for LessWrong and the Alignment Forum?
Quintin Pope
1y
4
11
[Link] Escape the Echo Chamber (2018)
CronoDAS
3d
0
4
The danger of error descriptions
gistya
1y
2
26
Paper review: A Cryptographic Solution to a Game Theoretic Problem
victorsintnicolaas
1y
4