Table of Contents
Peter S. Park, a postdoctoral fellow in artificial intelligence security at MIT, said that advanced AI will be widely released in the future Models will pose special problems because it is basically impossible to prevent misuse of AI models
Home Technology peripherals AI The risk of out-of-control AI triggered a sign-raising protest at Meta, and LeCun said the open source AI community is booming

The risk of out-of-control AI triggered a sign-raising protest at Meta, and LeCun said the open source AI community is booming

Oct 10, 2023 pm 09:05 PM
ai data

In the field of AI, people have long been divided on the choice of open source and closed source. However, in the era of large-scale models, open source has quietly emerged as a powerful force. According to a previously leaked internal document from Google, the entire community is rapidly building models similar to OpenAI and Google's large-scale models, including open source models such as LLaMA around Meta

There is no doubt that , Meta is the core of the open source world and has been making continuous efforts to promote the cause of open source, such as the recently released Llama 2. However, as we all know, a big tree must have dead branches. Recently, Meta has been in some trouble because of open source.

Outside Meta’s San Francisco office, a group of protesters holding signs gathered together, Protest Meta's strategy of publicly releasing AI models, claiming that these released models cause the "irreversible proliferation" of potentially unsafe technologies. Some protesters even compared the large models released by Meta to "weapons of mass destruction."

These protesters call themselves "concerned citizens" and are led by Holly Elmore. According to LinkedIn, she is an independent advocate for the AI ​​Pause movement.

The risk of out-of-control AI triggered a sign-raising protest at Meta, and LeCun said the open source AI community is booming

What needs to be rewritten is: Image source: MISHA GUREVICH

If a model is proven not to be To be safe, she noted that the API can be turned off, such as by allowing users to access only large models through the API, as Google and OpenAI do. In contrast, Meta's LLaMA series of open source models provide model weights to public, which allows anyone with the appropriate hardware and expertise to copy and tweak the model themselves. Once model weights are released, the publishing company no longer has control over how the AI ​​is used

For Holly Elmore, releasing model weights is a dangerous strategy because anyone can modify them model, and these modifications cannot be undone. She believes that "the more powerful the model, the more dangerous this strategy is."

Compared with open source, large models accessed through APIs often have various security features, such as response filtering or passing specific Training to prevent the output of dangerous or aversive responses

If you can free up the model weights, it will be easier to retrain the model to jump over these "guardrails". This makes it more possible to exploit these open source models to create phishing software and conduct cyber attacks

What needs to be rewritten is: Image source: MISHA GUREVICHThe risk of out-of-control AI triggered a sign-raising protest at Meta, and LeCun said the open source AI community is booming

Because she believes that part of the problem is "insufficient security measures for model release" and that there needs to be a better way to ensure model security.

Currently, Meta has not commented on this. However, Yann LeCun, chief AI scientist at Meta, seemed to respond to the statement that "open source AI must be outlawed" and showed the flourishing open source AI startup community in Paris

There are many people who disagree with Holly Elmore, who believe that an open strategy for AI development is the only way to ensure trust in technology. The risk of out-of-control AI triggered a sign-raising protest at Meta, and LeCun said the open source AI community is booming

Some netizens said that open source has pros and cons. It can allow people to gain greater transparency and enhance innovation, but it will also face the risk of misuse (such as code) by malicious actors.

As expected, OpenAI was once again ridiculed, "It should return to open source." The risk of out-of-control AI triggered a sign-raising protest at Meta, and LeCun said the open source AI community is booming

There are many people who are worried about open sourceThe risk of out-of-control AI triggered a sign-raising protest at Meta, and LeCun said the open source AI community is booming

Peter S. Park, a postdoctoral fellow in artificial intelligence security at MIT, said that advanced AI will be widely released in the future Models will pose special problems because it is basically impossible to prevent misuse of AI models

However, Stella Biderman, executive director of EleutherAI, a nonprofit artificial intelligence research organization, said: "To So far, there is little evidence that the open source model has caused any specific harm. It is unclear whether simply placing a model behind the API will solve the security problem."

Biderman believes: "The basic elements for building an LLM have been disclosed in a free research paper, and anyone in the world can read the paper to develop their own model."

She also added: "Encouraging companies to keep model details secret may have serious adverse consequences for the transparency of research in the field, public awareness and scientific development, especially for independent researchers."

Although everyone has been discussing the impact of open source, it is still unclear whether Meta's method is really open enough and whether it can take advantage of open source.

Stefano Maffulli, executive director of the Open Source Initiative (OSI), said: "The concept of open source AI has not been properly defined. Different organizations use the term to refer to different things - Indicates varying degrees of "publicly available stuff," which can confuse people."

Maffulli pointed out that for open source software, the key issue is whether the source code is publicly available and accessible. Reproduction for any purpose. However, reproducing an AI model may require sharing training data, how the data was collected, training software, model weights, inference code, and more. Among them, the most important thing is that the training data may involve privacy and copyright issues

OSI has been working on giving an exact definition of "open source AI" since last year, and it is very likely that it will be An early draft will be released in the coming weeks. But no matter what, he believes that open source is crucial to the development of AI. “We can’t have trustworthy, responsible AI if AI is not open source,” he said.

In the future, the differences between open source and closed source will continue, but open source is unstoppable.


The above is the detailed content of The risk of out-of-control AI triggered a sign-raising protest at Meta, and LeCun said the open source AI community is booming. For more information, please follow other related articles on the PHP Chinese website!

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

R.E.P.O. Energy Crystals Explained and What They Do (Yellow Crystal)
1 months ago By 尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. Best Graphic Settings
1 months ago By 尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. How to Fix Audio if You Can't Hear Anyone
1 months ago By 尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. Chat Commands and How to Use Them
1 months ago By 尊渡假赌尊渡假赌尊渡假赌

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

Debian mail server firewall configuration tips Debian mail server firewall configuration tips Apr 13, 2025 am 11:42 AM

Configuring a Debian mail server's firewall is an important step in ensuring server security. The following are several commonly used firewall configuration methods, including the use of iptables and firewalld. Use iptables to configure firewall to install iptables (if not already installed): sudoapt-getupdatesudoapt-getinstalliptablesView current iptables rules: sudoiptables-L configuration

How debian readdir integrates with other tools How debian readdir integrates with other tools Apr 13, 2025 am 09:42 AM

The readdir function in the Debian system is a system call used to read directory contents and is often used in C programming. This article will explain how to integrate readdir with other tools to enhance its functionality. Method 1: Combining C language program and pipeline First, write a C program to call the readdir function and output the result: #include#include#include#includeintmain(intargc,char*argv[]){DIR*dir;structdirent*entry;if(argc!=2){

How to implement file sorting by debian readdir How to implement file sorting by debian readdir Apr 13, 2025 am 09:06 AM

In Debian systems, the readdir function is used to read directory contents, but the order in which it returns is not predefined. To sort files in a directory, you need to read all files first, and then sort them using the qsort function. The following code demonstrates how to sort directory files using readdir and qsort in Debian system: #include#include#include#include#include//Custom comparison function, used for qsortintcompare(constvoid*a,constvoid*b){returnstrcmp(*(

Debian mail server SSL certificate installation method Debian mail server SSL certificate installation method Apr 13, 2025 am 11:39 AM

The steps to install an SSL certificate on the Debian mail server are as follows: 1. Install the OpenSSL toolkit First, make sure that the OpenSSL toolkit is already installed on your system. If not installed, you can use the following command to install: sudoapt-getupdatesudoapt-getinstallopenssl2. Generate private key and certificate request Next, use OpenSSL to generate a 2048-bit RSA private key and a certificate request (CSR): openss

How to perform digital signature verification with Debian OpenSSL How to perform digital signature verification with Debian OpenSSL Apr 13, 2025 am 11:09 AM

Using OpenSSL for digital signature verification on Debian systems, you can follow these steps: Preparation to install OpenSSL: Make sure your Debian system has OpenSSL installed. If not installed, you can use the following command to install it: sudoaptupdatesudoaptininstallopenssl to obtain the public key: digital signature verification requires the signer's public key. Typically, the public key will be provided in the form of a file, such as public_key.pe

How Debian OpenSSL prevents man-in-the-middle attacks How Debian OpenSSL prevents man-in-the-middle attacks Apr 13, 2025 am 10:30 AM

In Debian systems, OpenSSL is an important library for encryption, decryption and certificate management. To prevent a man-in-the-middle attack (MITM), the following measures can be taken: Use HTTPS: Ensure that all network requests use the HTTPS protocol instead of HTTP. HTTPS uses TLS (Transport Layer Security Protocol) to encrypt communication data to ensure that the data is not stolen or tampered during transmission. Verify server certificate: Manually verify the server certificate on the client to ensure it is trustworthy. The server can be manually verified through the delegate method of URLSession

How to do Debian Hadoop log management How to do Debian Hadoop log management Apr 13, 2025 am 10:45 AM

Managing Hadoop logs on Debian, you can follow the following steps and best practices: Log Aggregation Enable log aggregation: Set yarn.log-aggregation-enable to true in the yarn-site.xml file to enable log aggregation. Configure log retention policy: Set yarn.log-aggregation.retain-seconds to define the retention time of the log, such as 172800 seconds (2 days). Specify log storage path: via yarn.n

Centos shutdown command line Centos shutdown command line Apr 14, 2025 pm 09:12 PM

The CentOS shutdown command is shutdown, and the syntax is shutdown [Options] Time [Information]. Options include: -h Stop the system immediately; -P Turn off the power after shutdown; -r restart; -t Waiting time. Times can be specified as immediate (now), minutes ( minutes), or a specific time (hh:mm). Added information can be displayed in system messages.

See all articles