AI-powered
podcast player
Listen to all your favourite podcasts with AI-powered features
Trusted Editing and Red Team Strategy
When suspicious of code, use trusted editing to remove backdoors. Trusted monitoring helps identify suspicion levels. Audit the top 2% of suspicion. For suspicion between 2% and 20%, use edited solutions, and for over 20%, use the original solution. In red team strategies, code subtle backdoors strategically for copies. The paper relates to scalable oversight papers focusing on labor sources for building useful processes interacting with models through inference and training.