I’ll piggyback on this (excellent) post to mention that we’re working on some of the governance questions mentioned here at Rethink Priorities.
For example: @Onni Aarne is working on hardware-enabled mechanisms for compute governance (this touches on a bunch of stuff that comes up in Yonadav’s paper, like tamper-evident logging), and I am working on China’s access to ML compute post October export controls. @MichaelA is supervising those projects.
We’re definitely happy to hear from others who are working on these (or related) things, are considering considering working on these things, or are simply interested in these things! (You can reach any of us at <firstname>@rethinkpriorities.org.)
We expect to open a hiring round for another compute governance person soon™.
Our other projects are summarized in this two-pager, and some are also relevant to problems listed in this post.
I’ll piggyback on this (excellent) post to mention that we’re working on some of the governance questions mentioned here at Rethink Priorities.
For example: @Onni Aarne is working on hardware-enabled mechanisms for compute governance (this touches on a bunch of stuff that comes up in Yonadav’s paper, like tamper-evident logging), and I am working on China’s access to ML compute post October export controls. @MichaelA is supervising those projects.
We’re definitely happy to hear from others who are working on these (or related) things, are considering considering working on these things, or are simply interested in these things! (You can reach any of us at <firstname>@rethinkpriorities.org.)
We expect to open a hiring round for another compute governance person soon™.
Our other projects are summarized in this two-pager, and some are also relevant to problems listed in this post.