Discussion about this post

User's avatar
Jared Porcenaluk's avatar

I have never heard the original story, much less tried to extrapolate it to our modern LLM-world. However, I have thought about the sheer complexity of software and how much trust we put in it. Right now I'm writing in (1) an HTML form that has (2) been put on substack, which itself will use (3) an HTTP protocol to send the data over multiple network hops (4) across the internet (presumably secure). This is all on my browser (5) that runs on my operating system (6) which runs on Intel, Micron, and Qualcomm hardware (7,8,9), with a BIOS that is sandwiched in-between by Dell (10).

At each of these layers, there are likely dozens, hundreds, or thousands of partners, employees, and open source contributors (Substack made *128 network calls* to .js, .html, and image files when I opened the website) who have contributed code.

It makes it hard for me to believe that, as software gets more sophisticated and opaque, there *wouldn't* be more vulnerabilities contained. And, considering modern LLMs represent some of the most sophisticated and opaque (even to the creators) software out there, I would be surprised if there _weren't_ extremely harmful vulnerabilities contained - intentional or otherwise.

Expand full comment

No posts