1087
submitted 11 months ago by wiki_me@lemmy.ml to c/opensource@lemmy.ml
you are viewing a single comment's thread
view the rest of the comments
[-] Lionir@beehaw.org 9 points 11 months ago

This is a false equivalence. Encryption only works if nobody can decrypt it. LLMs work even if you censor illegal content from their output.

[-] mojo@lemm.ee 2 points 11 months ago

You miss the point. My point is that if you want to have a consistent view point, you need to acknowledge and defend the harmful sides. Encryption can objectively cause harm, but it should absolutely still be defended.

[-] Lionir@beehaw.org 8 points 11 months ago

This is just enlightened centrism. No. Nobody needs to defend the harms done by technology.

We can accept the harm if the good is worth it - we have no need to defend it.

LLMs can work without the harm.

It makes sense to make technology better by reducing the harm they cause when it is possible to do so.

[-] janguv@lemmy.dbzer0.com 2 points 11 months ago

He would have been better off not talking about harm directly but the ability to cause harm; he actually used that wording in an earlier comment in this chain. (Basically strawmanned himself lol.)

Because as a standalone argument for encryption, it's fairly sound – hey, the ability of somebody to cause harm via encrypted messaging channels is the selfsame ability to do good [/prevent spying/protect privacy, whistleblowers/etc], and since the good outweighs the bad, we have to protect the ability to cause harm (sadly).

The problem is it's still disanalogous – the ability to cause harm via LLM use is not the selfsame ability to do good (or to do otherwise what you want). My LLM's refusing to tell me how to make a bomb has no impact on its ability to tell me how to make a pasta bake.

[-] wagesj45@kbin.social -1 points 11 months ago
[-] bear@slrpnk.net 4 points 11 months ago* (last edited 11 months ago)

What the fuck is this "you should defend harm" bullshit, did you hit your head during an entry level philosophy class or something?

The reason we defend encryption even though it can be used for harm is because breaking it means you can't use it for good, and that's far worse. We don't defend the harm it can do in and of itself; why the hell would we? We defend it in spite of the harm because the good greatly outweighs the harm and they cannot be separated. The same isn't true for LLMs.

[-] mojo@lemm.ee 2 points 11 months ago

We don't believe that at all, we believe privacy is a human right. Also you're just objectively wrong about LLMs. Offline uncensored LLMs already exist, and will perpetually exist. We don't defend tools doing harm, we acknowledge it.

[-] bear@slrpnk.net 3 points 11 months ago

We don't believe that at all, we believe privacy is a human right.

That's just a different way to phrase what I said about defending the good side of encryption.

Offline uncensored LLMs already exist, and will perpetually exist

I didn't say they don't exist, I said that the help and harm aren't inseparable like with encryption.

We don't defend tools doing harm, we acknowledge it.

"My point is that if you want to have a consistent view point, you need to acknowledge and defend the harmful sides."

If you want to walk it back, fine, but don't pretend like you didn't say it.

[-] jasory@programming.dev 2 points 11 months ago

Encryption only works if certain parties can't decrypt it. Strong encryption means that the parties are everyone except the intended recipient, weak encryption still works even if 1 percent of the eavesdroppers can decrypt it.

[-] Lionir@beehaw.org 2 points 11 months ago

I mean, I don't understand the point of an encryption that people can decrypt without it being intended. Just seems like theatre to me.

But yeah, obviously the intended parties have to be able to decrypt it. I messed up in my wording.

[-] jasory@programming.dev 1 points 11 months ago

You realise that most encryption can be decrypted by third-party? Many cryptography libraries have huge flaws, even the Handbook of Applied Cryptography was encouraging using Damgard et al's parameters for prime selection even though the original authors never claimed the accuracy that others assumed (without basis). Even now, can you guess how many cryptography libraries would be broken if someone found a BPSW pseudoprime? And we have arguments that they probably exist, but crypto developers just ignore it either out of ignorance or laziness.

In summary, it's all theatre, you just want to deny access to enough parties that it makes you comfortable.

this post was submitted on 30 Sep 2023
1087 points (98.7% liked)

Open Source

30391 readers
558 users here now

All about open source! Feel free to ask questions, and share news, and interesting stuff!

Useful Links

Rules

Related Communities

Community icon from opensource.org, but we are not affiliated with them.

founded 5 years ago
MODERATORS