I haven’t finished reading this post yet, but I noticed that you’re only considering type-1 risk in Bostrom’s typology. Type-2a, type-2b, and type-0 risks don’t require “malicious actors” or “actors who want to cause such events” for catastrophe to occur. This is probably fine since surveillance is mostly a response to type-1 risk, but I want to note that there are vulnerabilities other than those you discuss.
Yeah, thanks for flagging this! I didn’t cover the other kinds of risks because I think the case for surveillance is strongest for mitigating type-1 risks, and Bostrom’s suggestions for mitigating other risks looked less contentious.
I haven’t finished reading this post yet, but I noticed that you’re only considering type-1 risk in Bostrom’s typology. Type-2a, type-2b, and type-0 risks don’t require “malicious actors” or “actors who want to cause such events” for catastrophe to occur. This is probably fine since surveillance is mostly a response to type-1 risk, but I want to note that there are vulnerabilities other than those you discuss.
Yeah, thanks for flagging this! I didn’t cover the other kinds of risks because I think the case for surveillance is strongest for mitigating type-1 risks, and Bostrom’s suggestions for mitigating other risks looked less contentious.