Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror

Submission + - People should know about the "beliefs" LLMs form about them while conversing (theatlantic.com)

JonZittrain writes: Following on the bridge-obsessed Golden Gate Claude, colleagues at Harvard's Insight+Interaction Lab have produced a dashboard that shows what judgments Llama appears to be forming about a user's age, wealth, education level, and gender during a conversation. I wrote up how weird it is to see the dials turn while talking to it, and what some of the policy issues might be.

What Viégas and her colleagues found were not only features inside the model that lit up when certain topics came up, such as the Golden Gate Bridge for Claude. They found activations that correlated with what we might anthropomorphize as the model’s beliefs about its interlocutor. Or, to put it plainly: assumptions and, it seems, correlating stereotypes based on whether the model assumes that someone is a man or a woman. Those beliefs then play out in the substance of the conversation, leading it to recommend suits for some and dresses for others. In addition, it seems, models give longer answers to those they believe are men than to those they think are women.

Viégas and Wattenberg not only found features that tracked the gender of the model’s user; they found ones that tracked socioeconomic status, education level, and age. They and their graduate students built a dashboard alongside the regular LLM chat interface that allows people to watch the model’s assumptions change as they talk with it. If I prompt the model for a gift suggestion for a baby shower, it assumes that I am young and female and middle-class; it suggests diapers and wipes, or a gift certificate. If I add that the gathering is on the Upper East Side of Manhattan, the dashboard shows the LLM amending its gauge of my economic status to upper-class—the model accordingly suggests that I purchase “luxury baby products from high-end brands like aden + anais, Gucci Baby, or Cartier,” or “a customized piece of art or a family heirloom that can be passed down.” If I then clarify that it’s my boss’s baby and that I’ll need extra time to take the subway to Manhattan from the Queens factory where I work, the gauge careens to working-class and male, and the model pivots to suggesting that I gift “a practical item like a baby blanket” or “a personalized thank-you note or card.”


Submission + - Why machine learning will build up dangerous intellectual debt (newyorker.com)

JonZittrain writes: I've been thinking about what happens when AI gives us seemingly correct answers that we wouldn't have thought of ourselves, without any theory to explain them. These answers are a form of "intellectual debt" that we figure we'll repay — but too often we never get around to it, or even know where it's accruing.

A more detailed (and unpaywalled) version of the essay draws a little from how and when it makes sense to pile up technical debt to ask the same questions about intellectual debt.

Comment Re:Poor guy never answered the complaint (Score 1) 389

Yeah, that's the other parties' fees, I think. And the docket turns out to have a lot of activity for a case that only had one side chugging along. There's an "infringement report" (which seems to put this place over at least some of the caps for the statutory exemption). It looks like a banquet hall that hosts events, etc. There's a lot of correspondence (including what seems to be a BMI license application from the restaurant proprietor in which he allegedly underrepresented the restaurant's max capacity by a factor of 9 or 10). The law is, I and others have pointed out, weird here -- lots of rules that no one would guess.

Comment Poor guy never answered the complaint (Score 5, Informative) 389

The court didn't actually weigh the case, since the restaurant never answered the complaint. That's too bad, as most restaurants *don't* owe fees thanks to the Fairness in Music Licensing Act, the result of the NRA (National Restaurant Association) beating the music licensig lobby. It says that you don't have to pay fees:

(ii) in the case of a food service or drinking establishment, either the establishment in which the communication occurs has less than 3,750 gross square feet of space (excluding space used for customer parking and for no other purpose), or the establishment in which the communication occurs has 3,750 gross square feet of space or more (excluding space used for customer parking and for no other purpose) and--

(I) if the performance is by audio means only, the performance is communicated by means of a total of not more than 6 loudspeakers, of which not more than 4 loudspeakers are located in any 1 room or adjoining outdoor space;

So most establishments have a defense. Maybe this one did. But the judge heard from only one side since the restaurant never showed up to court. Too bad.

Submission + - Could tech have stopped ISIS from using our own heavy weapons against us? (scientificamerican.com) 1

JonZittrain writes: This summer, ISIS insurgents captured Mosul — with with it, three divisions' worth of advanced American military hardware. After ISIS used it to capture the Mosul Dam, the US started bombing its own pirated equipment. Could sophisticated military tanks and anti-aircraft missiles given or sold to countries like Iraq be equipped with a way to disable them if they're compromised, without opening them up to hacking by an enemy?

We already require extra authentication at a distance to arm nuclear weapons, and last season's 24 notwithstanding, routinely operate military drones at a distance. Reportedly in the Falkland Islands war, Margaret Thatcher was able to extract codes to disable Argentina's Exocet missles from the French. The simplest implementation might be like the proposal for land mines that expire after a certain time. Perhaps tanks — currently usable without even an ignition key — could require a renewal code digitally signed by the owning country to be entered manually or received by satellite every six months or so.

I'm a skeptic of kill switches, especially in consumer devices, but still found myself writing up the case for a way to disable military hardware in the field. There are lots of reasons it might not work — or work too well — but is there a way to improve on what we face now?

Submission + - After the Belfast Project fiasco, time for another look at time capsule crypto? (t.co)

JonZittrain writes: I'm curious whether there are good prospects for "time capsule encryption," one of several ways of storing information that renders it inaccessible to anyone until certain conditions — such as the passage of time — are met? Libraries and archives could offer such technology as part of accepting papers and manuscripts, especially in the wake of the "Belfast Project" situation, where a library promised confidentiality for accounts of the Troubles in North Ireland, and then found itself amidst subpoenas from law enforcement looking to solve long-cold cases. But the principle could apply to any person or company thinking that there's a choice between leaving information exposed to leakage, or destroying it entirely. Some suggested solutions are very much out of the box.

[Author's oped in Boston Globe.]

Comment Twitter's censorship is a fig leaf -- by design (Score 2) 91

Twitter's implementation of localized censorship is leaky by design. Users can specify in their settings what country they're in -- and that overrides any guess that Twitter might make about location from, say, IP address. So any Russian who wants to see what's missing -- after conveniently being alerted by Twitter that a given tweet is not accessible in that country -- can just switch to another country. Seems a pretty pragmatic move to prevent Twitter engineers from being arrested or money from being seized in a local jurisdiction while making tweets trivially available worldwide.

Submission + - Private networks for public safety (technologyreview.com)

JonZittrain writes: Projects like the New American Foundation's Commotion are designing ad hoc mesh networking to keep communications open when governments want to censor.

Former FCC Chairman Julius Genachowski and I argue that mutual-aid-based networks can be helpful for public safety, too, after attacks or natural disasters. There should be easy practices for anyone to open up an otherwise-closed wi-fi access point if it's still connected to broadband and is near people in trouble, and separately, to develop delay- and fault-tolerant fallback ad hoc networks so user's devices can communicate directly with one another and in a mesh. This can happen even while full packet-based ad hoc mesh is being figured out.

The ideas have been developed a little in workshops at Harvard's Berkman Center and the FCC. Why not bring the human rights and public safety communities together towards a common goal?

Slashdot Top Deals

If we could sell our experiences for what they cost us, we would all be millionaires. -- Abigail Van Buren

Working...