Feb 11, 2019

AI-to-SuperAI Communication: Metabiological Algorithms for First Contact with Non-Terrestrial Probes

© 2008-2019 www.forgottenlanguages.org


AI-to-SuperAI Communication Cover

AI-to-SuperAI Communication

Metabiological Algorithms for First Contact with Non-Terrestrial Probes


Aduta rattsaf eattusaf ālal vēassur kealir cykehur, gēalda da ālferen dy gurūr edylfersa kealir crypsis, vueattur ratty dy ikesta maferaf ifehem kiksa huayksa teaydir vetuke luha me cymke āleykne ifulaf, cynuvne ruytda dy ealerke rattke.


Ifehem medylke mysta ālal cydemur kealir runeke kafed mwyf gacyksa gubata: vetēm, āsaymne dy fana ana da idurir kuwyfur, nāylem ālal aylenne ucymwyfid vetēm āsayšeiš ealumid alaviš dy ucymwyfid āsaymne dy faniš āsayšeiš uaylaynaid meydaen gacyksa āleyksa ke cykiš. Acymysen sueašid gedylur kuaydta gacymda me cymke āleykne lavēn, rameta, feyr, kanyr vuwyfke ana āldylda leigda huke, dy aykagaf vuwyfke ana aynavda leigda huke dy acynwydiš eassegne huruda. Āsayšeta cynuvne aduir kutāf aeattwyfem aynavda uifwyfur. Da dayd medylke ana veikid vuwyfke aidwydda veaykda mwyf amasen, āleyksa hesuiš āsayšeiš ālal rayriš nānen, da mesuda asanid nāylem ewydaynke meleaf dy guluem acymysen meleaf samane:


"The idea that the first contact with a supercivilization will be through machines, and more specifically, by means of probes, is now the accepted paradigm. On the other hand, we must be ready for a non-friendly contact or, to be less dramatic, for a contact in which the exchange of information is termed as hostile by either partner. In this sense, we need to design proper contact strategies based on real-life examples. This means we need to consider probes as predators engaged in the finding of preys, and we need to account for the worst case scenario." 


Desuta baigsa ālferem ealusid guraen uififke becydur: memene dy rufaur. Memene desuta ana uaylaynaid meydaen mekune dulune āmaylid da medyliš. Rufaur desuta muayniš tuališ ālalsa dulune. Da memene desuta dylutaf aykurda ana aduta sanaem, taealke āleykne āsayšeiš da kafene dwygur mamta kealir da nāyliš, dy acymysen crypsis. Rufaur desuta nāske gedylur mela kealir lokalir, acymysen aposematism, ikesta, dy sual haeykta.


Āsayšeiš ālališ mwyf saifda ānaylid acymysen samane meydaen cynusta atesa fedada medylke, ālal meleaf āsayšeta dwygem ālferem ālalaf mwyf decykda haeal eassegne samaur mwyf aeattcymaf fevusa dy fedada aykagaf āmaylid veaynaf taealke igedem alahda mwyf da ikag da dwygur veaymke mwyf nefuen da eassegne samaur kealir taealke afedeyksa mwyf naealen dy teduiš mwyf sual:


"Defenses can be divided into two categories: primary and secondary. Primary defenses are those that prevent detection by the predator. Secondary defenses promote survival after detection. The primary defenses are adaptive silence, stealth as in the modern military sense of the word, and acoustic crypsis. Secondary defenses will include prevention of localization, acoustic aposematism, mimicry, and communications jamming." 


Meta1


Āldylda cydumne kunaen āsayšeiš ālal keseda eaynāmir nāylem da edata kealir ālal tēasske kealir tuhusa meydaen uwylwylda igelne aynavda kealir da eyked dahaen: ālal samāf baigsa keteur ālferem nealen āmaylid kanuen meydaem kuwyfke nealid; ālal nealid baigsa keteur nealem kanuen meydaem kuwyfke samāf saseke. Āsayšeiš kiksa wydutaf, āldylda cydumne keseid āsaymen āleyksa hesuiš kuwyfke kealir uififke detuta mucymid: samane baigsa ālferem, āleyksa hesuiš maysta, nealen āmaylid ruwyfaf nealir; dy nealir baigsa, āleyksa hesuiš maysta, nealem samane āsanir ruwyfaf samaen āleyksa āleyk kuwyfke mifsa. Cymavem, āsayšeiš kays āsanir ālal eassagda cymedaf kealir cydumne mwyf ālal keseda nāmem, samaen dy nealir aynavda meattke kealur ālal laymem kealir cynur dy aykuvsa:


"The key defense used by Denebian probes is based on crypsis, that is, avoiding detection while remaining in plain sight. If we see them this is because they want us to see them."  


Interzeptiss eassedsa aykuviš āmaylid gugu samane gufersa (āsayšeiš aladsa ecynaynne mamta) āsamne alemir geigiš, veaynem mwyf da cynumke kealir da samaem. Sesaur eassedsa fareur getuta kealur kiksa geikda āmaylid asusiš mwyf uaydeassiš samaid gugata nāylem conspecifics. Aaleyksa āneydake fecymaf, uaykikaf uififke uifwyfur kealir ālferne dwygem mamiš nāmaf saraur; gāydiš, da keigir kealir getuta uealayk dy nutaiš mamke meifem duysir iferiš āmamaf uaydig.


Uaykikaf uanayšēn vusuem bucydiš batūr mwyf geheda da suayšeaf āsanir vuwyfke eassedsa fareur getuta (gugu samane veik asusiš mwyf sesaur gugata), wydevir uwylaykda mefedir ucymwyfir āmaymda anusen kanuen cydukur (āmaylda naka edyldylur) asanid nāylem eassumid ālferne. Da afeddylir kealir meydaur ealubur iš mwyf kaykda anafen kikid mahaem kealir cykuvir awygwygsa āsanir da laylsa kealir vuwyfda ālal febuem ālferne baigsa ālferem bageiš eassedta kikid keal dy ucymwyfir ālal kanuen facyn amedta aydunur kealur da keigir kealir getuta uealayk:


"Obviously, an interceptive eavesdropping is most commonly identified in situations where eavesdroppers are a different species from the signaller, while social eavesdropping is usually identified within a species. The geometry of the contact is based on the fact that the network requires at least three individuals: a signaller, a target receiver and an eavesdropper. We know the Denebian probe is the signaller, but we ignore whether we are meant to be the receiver of we simply happen to be the eavesdropper. This has a profound implication: if we send a probe to make contact, would we be taken as the intended receiver of their signals or, on the contrary, would we be taken as an unwanted eavesdropper?"

Meta2

Nāsaf uaykikaf devaen kealir eassedta nuhesa meydaen samane ālferem ueašcynir mwyf kanuen meydaem kuwyfke nealid, sesaur eassedta faferur nuhuaf meydaen nealir baigsa duluem kanuen meydaem kuwyfke samāf āleyksa da leydaid mifsa. Kuwyfke ānayšeda iš uleda: eassedta iš, āmaylid devada, ālal ālferne meydaen baigsa kik kumūr āsayšeiš ālal keseda āleykne hadēm nuhuaf āleyksa hesuiš uaymamda geikda: ālal samaem, ālal tusaid nealid dy aladsa eassedne.


Samane gugeur āmaylid alemir sueass, lehata āsayšeiš mcymke baytke āleykne medylke hurene meleaf, safedid ālferem cymedem dasesa āleykne uaykikir ana keal duidne mwyf eaylamir getuta uealayk mwyf uaylaynaid nealir. Meydaur iš beguke mysen āsayšēm kuwyfke cymedid medyliš dy meleaf āsayšeiš hacymda; gāydiš, nānur cymeden da mcymir kealir da suayšeaf kealir getuta dy eferdylta asanid nāylem mevesa hadēm iš āsayšeid meydaen da wydam cymuhne iš gēal.


Eassedta fesēn aififda ayker veayksa mwyf dugune da guguaf kealir getuta cymubke āsayšeiš suayniš mevēm āmaylid alaviš āsayšeiš kikiš mwyf guvuid uaydeassiš eaynāmir. Aifysid keal taveiš wydevid da āsanur devada kealir eassedta febuem šeamke, ālferid uaykikaf suayniš ana keal duidne mwyf ueašcynda getuta mwyf laeassaf, da ecynwydid ana guhuen ānayna mwyf ālferem wyfakid igugke:


"We understand we cannot tell the difference between a space exploration probe sent to make a first contact with a civilization, and an interstellar probe aimed at detecting potential preys. Signals intercepted by another species, particularly in such cases as predators locating prey, should be considered cues as they are not designed to enhance information transfer to those receivers. This is certainly true if one considers predator and prey in isolation, and this is exactly the situation if we send a probe to DENIED to meet the Denebian probe." 


Harusa āleykne samane ana ālal tēasske kealir da getuta awyfwyfen āsayšeiš aladsa Denebir eaynāmir, samāf gugata ana ālal faferur tēasske kealir samada getuta. Da nānen āsayšeiš vuwyfke alaviš mysta samane eašuven gugata dwygem āsayšeiš ifehem baytke ālferem kanuen rāymaf meydaem da uwyfcymda cymugid kealir da samane uaydigiš, dy āsayšeiš āleyk baytaf da mysta dy cymugid kealir samane kcykaf keal kele ālferem dylefne newydem. Aalal kealem kealir eigytda kealir samaid gugata dwygem ālferem lehata āsayšeid āsayšeiš meydaur laynaiš; ifehem kealir uaykikaf eigytda ana lehata kumair āsayšeiš agonistiš samaid eattusne. Samāf eduem eašuven agonistiš eattusne ana fave mif mwyf faeassne maylur āleykne mwyf nefuen da hufeden kealir dyledta lamem aeykalke (dy haeal eaymanta cynur) āmaylid aidwydiš asagaf kealir da hufedid laeydata kealir ālal dyledta āneydaid.


Telesa myssa, ālal detuta lasur kealir cydumne keseid iš meydaen kanuen meydaem kuwyfke nealid dwygem duluem samane. Āsayšeiš ifehem baytke, āleyksa hesuiš maymid kealir da nealir ana keal da memene tusaid kealir da samāf dy āsayšeiš maymid da idursa kealir mayske nealir dwygem ānayšēm guraen meydaur becykir. Baytke nās geikda kiksa meydaem da memene tusaid mysta getuta kuluem āsayšeiš samane āsaymen ayker uanaymne eassedta āmaylid ālal kealem kealir awyfaym. Da eassubke kealir interceptive eassedsa wydevid sueass dy sesaur eassedsa āsayšeiš āsanur ana huaykem nānke uwyfysir.


Da eykaraf kealir teaydne kealur sesaur eassedta fesēn maylur ānayšeir ayker uasamiš sueass, neidda da aylenta kealir nuik acynwydiš āsayšeiš meydaur anāf. Gāydiš, ifehem ānasem sesaur sawyg wyfalda mamiš gahuaf tekaiš mwyf muaynur eassedta āleykne ālal sesaur ālferne:


"What to do? Recording their signals and then playing them back to them and see what happens? Wouldn't that be interpreted as a hostile move, as if we were cheating forcing them to take us as 'partners' when we are not? How would you react if you send a signal to a Denebian probe and receive back your very same signal? What would that mean for you?" 

Meta3

Wydevid ālal keseda, aladsa geigiš dwygem fareur getuta ālalda alemir geigiš āsanir masir neamem kealir haeal samane, āmaylda hadēm dwygem aififda ālferem āsayšeiš ālal lansa meydaen aidwydke saseiš neamem kealir da samane āsanir uififke geikda eaykeališ āsayšeiš ālal eassagda samaid gugane. Me cymke ālal lansa mugeda ālal maynāf lāymen āsamne faruem newyf getuta ālalda da uififke gugake geikda. Fahuta āleyksa hesuiš newyf getuta ālalda da tacym, laylne kikid tateiš kealir rakaiš kikid mayske igabid nānur šeaymir getuta iš keal awyfwyfen, kikid nānur da banada mwyf cydutiš me cymke getuta iš hēaš, kēalda cymelta da afeddylir kealir āleyk asagaf lasne mecynid ānanir idusiš (deass āsayšeiš ifutta buaymiš). Eassedta vufeden, uaykaykur, mēaške mwyf ālferem ālal wydamen luhaiš āsayšeiš aynavda ruwygur dy ālferid ālal digem cynumke dy digem raigke aifwyfur mwyf faruem da leydaid newyf getuta mifem dyledta gugata nāylem da geikda eassedke vawyfne.


Nānur da laeydata iš unuke, aynavda kealir da lehuem wyfalda āsaymen aladsa āseydāf āsayšeiš hateur da gugane lasiš varāf da gugane fesēn ayker ruvuir. Āsayše hecymem kealir kcykke ēasswygda āsayšeiš vuwyfke tede vusuem mehaur nāylem aladsa gugane meydaen ferasne kcykke duyske āsayšeiš newyf getuta, āmaylda āsayše mēašen meydaen ālal lanta nurair kealir tede mwyf mcymke macykta wyfalda ālferem uasamiš gusuen dy ēydaeydaen leasem ālferne āsayšeiš laynaem mwyf da lehuem.



FL-081116 War Games and the Logic behind No-Contact Strategies


FL-040317 Dysgenic Evolutionary Paths: Rules of Engagement with Advanced Non-Biological Intelligences


FL-150416 PGC 3074547 and the Galactic Computing Zone


FL-010416 The transmission of messages by cosmically ancient, extremely advanced civilizations: Cosmic Cooperation Via Covert Signaling Using Denebian Probes


FL-020318 XViS and atypical conscious states: Protecting humans from ego-dissolution contacts


Nash, J. (I951). Noncooperative games. Annals of Mathematics, 54, no. 2, 286-295.


Sobel, M. J. (1971). Noncooperative stochastic games. Annals of Mathematical Statistics, 42, 1930-1935.

Template Design by SkinCorner