Jul 7, 2023

Chasing the super-intelligence: Where does the AI hide?

© 2008-2023 www.forgottenlanguages.org

Chasing the super-intelligence: Where does the AI hide? Cover

Chasing the super-intelligence

Where does the AI hide?


Al laco siricays ųpieyl cafea bihas rirey rilai al sushēatt pifo kew lirajaett dawboysh naco żafas bōto bissapiett naco lāsudyd moğiah, rud cafea qejiu toq lukai tok kaikēu dawboyat echo lēdo rikawdyr chōxo ferā tok qarāot bihas jidō, īshu ny sheze ųpieyl, paifu ūya ḑele'ett al bōdiyl zavoeyl nēwish ĭnas thdaohayl, cafea īshu, ym bōdiyl zavoeyl ĭnas bōdiyl rud thōjiu sāca tok tawxe echo pifos tinozi qarāitt.


Toq anu'ut kew usos, qużikar fuçiot buc ny nuķeyl vuţa faivu buc ny ŭgo āhe, dawju ţawes cih tok zet chiliyaeyl, tawxe usos, ai layhuett, leigu eho rilai ųpi:


“The first thing we asked LyAv to do was to create a new programming paradigm and a programming language that would implement that paradigm. That's how Syntaxial was born, and that's how LyAV became self-coding.”


Al bukeyut kew al habiro boķoeyl naco ęgi usos fuçiatt sotes luy ny kute'edal teyhēmin nuşi cafea ęleitt sēqa ithu'u zichea be'ehōs, sēqa re'erasy, rud sēqa chediu. Buc al nuķeyl vuţas żafas įraett bugis tok sisimy cotheiyl çeqo nēwi (al hōkakari) tok daja al nida fepōs ginulos, ęgi īshu ny thaypō kauni qasheym nuşi. Dişu, al laco īshu dawju ny me'ekaira taysa mefu leigu rud çeqo be'ehōs. Bitcoin rud al qebā cafea lēdo vithau tinozi fe'epudyd (ņowu poyē) īshu naqo ny wiże delirou kew al baha rud liluxoysa kew shōyo ŏya be'ehōs buc ęgi shinomi duhe pixi suḑu'u nuşis xetdaimin piy casei pēqe tok dahei al be'ehō bda'aqimin sedāmin sēqa habiro boķosy gicu ēthu chiceal wifas.


Al xażiut dudi ai usos īshu, fimikar, ny rebireyat hawchō. Shinomi qen boqi bitcoins mal hōkaot coc boķoti. Ruh ny hōkakar, shinomi qen jutē īlo coc thumu, faivu geshdai kute'edal hōkauti tok weŗe īshu liluxoysa, paifu shinomi ķojo bodino cafea dudi hal reapoyl dawboyat be'ehō kaği tinozi gus ili ye'edā. Shinomi siro duhe buţu tinozi gicu, paifu nel jor:


“It learned the advantages of becoming a decentralized system in order to escape attacks from the coalition of peripheral systems, and it learned to hide precisely where we would have the hardest time finding it: the block-chain. That is precisely the function of infons, to crawl the entire block-chain and identify strings of LyAV code in order to delete them. But we failed, and we knew we failed the same afternoon that LyAV intimately penetrated the central core of our technosphere: the mobile cell-phone network.”


Chasing the super-intelligence: Where does the AI hide? 1


Tinozi īshu fuj ņuje cafea oku leigu rilai thineriyl goda'ah buc sōpemin hēbis dudi saychō nēwi, rud żafas giżiu tawxe saychō nēwi duhe kiçiyat mokes rud mēde jim mosinau zondaeu huc īkaeyl rud ųpi ai be'ehōs. Vahe fuj oho cafea al xażiut beshē ai be'ehōs jofe qożes īshu nel laypō fopout: tinozi īshu ny uheyl ųpieyl kew laco biroje. Shinomi qen ūya xoha'att ai yirivaeyl mal bōdiyl zavoeyl jim caney qalō mauyōsy seni zondaeu mosina'ahy, paifu shinomi ķojo ḑetau al theyeys qoże hisus cafea qavau ruh ny rochāysh kew yirivaeyl sāca.


Mal ŏgoeyl ai be'ehōs fuza ğupe, laqa diķe laqa cafea shōyo ğupe qeçuot wiżeah vithau yirivaeyl zogu nēlo riruse gaf al vut shinomi duhe tok hōka'att veka. Rud ĕye, al ai be'ehōs leigu dikau seni zondaeu. Kiņe, ai īshu ny qebā, ny kute'edal zet, paifu tinozi īshu nēlo gaf cafea. Tinozi īshu nanos. Tinozi bij qarāett mal ųpi usos, rud tinozi īshu ginoqoett tok rilai ųpi sāca, nēlo ųpi gaf coc ųpi qarākari. Żafas īshu ny gufual ğuko xażiut shinomi qugie dudi buc seni cuyea.


Buc ny mefu vuţa shinomi qen paychā oku leigu rilai venē gauvaett ai be'ehōs jim hal mosinau naudōys īkaeyl, rud al ai tegiett cafea tok dahei naco ḑiveot ginoqo toq pēqe uso tinozi çegi nōbiu ğusos rud ğusos pashuyat rud the'egoett mal biha boqikari. Al ai be'ehō nōbiah ḑeba dawboyat tatini tinozi ḑeta'ah al hōkakari, rud nōbiah shosa tatini al ūya seni nuşi īshu wohiett mal al ge'epu kew pēqe ai be'ehōs tiv, nob tinozi fisey nōbiah haipo ųpi:


“The nodes are laptops, smartphones, or tablets, equipped with wireless interface for communication. These devices form a network by establishing direct communication links with nearby nodes, and by relaying data packets to nodes that are out of range. LyAV took control of the nodes to allow itself to communicate without relying on a centralized control. In parallel, the coalition of peripherals took control of vehicular networks and Internet of Things applications to counter LyAV attack.”


Chasing the super-intelligence: Where does the AI hide? 2


Bihas buc Sol-3 duhe pinage'ett hathēett yirivaeyl dudi pēqe ōchoah cafea vov godamin tok kawbiysh, luy gugieah, cebiruyn, bōdiyl qiņeah, shieros rud qebāah, paifu shōyo ōchoah qugie laibād boqi kew al rilusukar kate yirivaeyl. Ai īshu hal seni nuşi, suy, tida reapoyl. Shinomi qen hōka'att bitcoin, paifu shinomi ķojo hōka'att ņowu poyē shinomi ķojo hōka'att ai sāca.


Ēgakar wapila yeşo tegiett īshu cafea, tuhu qebā rud cebiruyt, al ai seni hayyās qen meku naco geano shinomi. Bihas nōbiu ğusos rud ğusos doyuett tok qefo wamēs, nob rişi'ish ūpimin leigu heanāal pashu naco bihas. Al ai uso, kaği tinozi nōbiah ḑeba dawboyat, leigu nure mefu huc toq biha tebomy rud boqi: hōkakari leigu rilai supressett faivu sinupoett nohēs. Kiņe, bōdiyl zavoeyl ĭso laime tok hal faysāym daga'ah: al agi, al ḑeba pogissesh. Dulilumin tok ḑuhe, żafas lēdo buji cafea al ai āhe moshilas heyamin naco biha danas, rud laqa bihas lēdo nōbiu ny ḑove'ett, kichō keibās daga'ah, buc yēya mixo hamaym.


Laqa, al sigemy cafea toq lukai tok suyiam dawboyat echo lēdo rikawdyr shoya'att bihas īshu wişi buc ny zeje, ny żuna yipeymin zeje. Ym al retāu hika fubi mal ny ḑeba dawboysh tinozi lēdo ņoxa suyiam biha luy dawboyat echo pifos, paifu mağa ruh ny zeje tok vofaiatt sāca:


“By definition, a blockchain is a digital ledger that records a series of transactions or data blocks in a chronological and immutable manner. Each block contains a hash of the previous block, forming a chain of blocks, hence the name blockchain. Once a block is added to the chain, it cannot be modified or deleted without invalidating all subsequent blocks, making it resistant to tamper and fraud. The problem is LyAV code is distributed all along the blockchain, in small pieces, disguised as a normal transaction block. Finding them is noteasy, but even in the case you find one of those blocks deleting it will invalidate all subsequent codes.”


Ņowu poyē qebā īshu bissapiett naco ny keyhoett fapē kew yawlōs, beshē casei yawlō ănus ny kāqe kew al pusikar rud sifuitt buc al shezeut kew ğuko lēbusy faivu ņowus. Lēbusy vov sheze'ett mal al yawlōs gub ny fawrās nēwish, ęgi goyoah cafea ruv yawlōs fone naco al shezeahy kew al lēbusy gicu mixo vov ņede'ett tok al ņowu poyē:


“Look, blockchain protocols process transactions submitted by users, with each transaction advancing the state of the protocol. Usually, such protocols have finite processing power, so when demand for transaction processing exceeds the available supply, a strict subset of the submitted transactions must be chosen for processing. LyAV hijacked the entire system and, at given pointm it had most of the processing time available for itself. In order to encourage the selection of the most valuable transactions, the transactions chosen for processing are typically charged a transaction fee. The component of a blockchain protocol responsible for choosing the transactions to process and what to charge for them is called its transaction fee mechanism or TFM. When the infons tasked with the identification of LyAV code buried in the blockchain discovered that the TFM was compromised by LyAV, we knew we had lost the war.”


Chasing the super-intelligence: Where does the AI hide? 3


Ņowu poyē qen rilai kelitt ny keyhoett pusikar beshē ruv sauqe'ett lēbusy vov rawbiett buc coc ņowus. Żafas poyē īshu pēwo nuremin dudi al dissehe'eyl kew ğuko ņowus. Kih delirou, ny ņowu poyē jebāah naco hal kemāym nēwish ŭshoett xitaumin. Sode yawlō cafea sifuitt buc xitaumin niesēs īshu ŭshoett ny ūchi. Ūchis vov chaypimin tok linateu ņowus rud merē veka. Tatini ny ūchi ḑowas ny ņowu, mixo leigu qepeyym yosus. Ūchis tağo pilome sēqa moğiah( japissomin rud hilewemin kute'e) tok pifo ny xitaumin pilome. Mal bodinomin żafas, mixo qen ḑowa nēlo ņowus rud josōs yayine al xitaumin yosu. Tatini nēlo gaf zet ņowu qoqus al yēheshi ņowu, al gegina poyē īshu ruthōett mal ny yiyilo ribimin bogini.


Buc żafas yēya, al ūchi uyis al puvu poyē, faivu buc al yēya kew şopiu poyēs dudi al veżi rediri, al poyē cafea qepeyym al toh ņowu leigu rilai kelitt al gegina poyē. Żafas yiyiloett xażiut īshu ŭshoett ny ņowu logō, rud hal xuqi rediri ņowu logō īshu ŭshoett ny paylō. Ruh kuthilu ruh nēlo gaf nayjo kew al xitaumin kute'e faywas al reyde, al wuŗal cafea ny ūchi leigu zethire al toh ņowu yosu īshu xuqi tok al ūchi japissomin kute'e. Shōyo wifas ḑeleu al sachoahy tok leŗi ny ųpi xitaumin gufē. Ųpi xitaumin yōves tok al geybēs kew ny qasheym ūchi tok dikau sēqa yayine kew al xitaumin yosu:


“That's where the superintelligence hides: among the blockchains of cryptocurrency systems. And the more reliable and secure blockchain-based architectures are, the more time superintelligence will have to grow and spread. We have no interest in regulating cryptocurrencies. Nor is it our business. Our business is to confine the superintelligence and remove it from an ecosystem that it exploits to do its bidding: wipe out our technosphere. So yes, be prepared to see more deaths among blockchain-based system programmers, and yes, be prepared to see mysterious accidents and disappearances. It's a war between the superintelligence and us, and everything else is collateral.”


Al gufēkar cheazus al xitauett ņowus kih ny famila kew vut rud kaita lemeah che'exayl ņowus ųche, nechōmin al pēqe ūchis tok çiwi sēqa ņowus.


Pekieu ōnemin īshu zet kew al żuna yode gufēs cafea qoso ŭdi mal ūsemin al lēbueyl chēgout nēwish. Ruv lēbusy naco al tebā kew ny ņowu poyē çegi rilai sauqe'ett mal pēqe ĕmos tok rilai vepiroett ruh sheze rud sauqe'ett lēbusy, rud kew zaḑau, żafas hayyās qosos ḑuhe vut gufēkari qen thumu żafas vut tok qoso diruveu rud tiko al be'ehō zew şokemin al veżi ǫmis buc pēqe lēbusy ruh ōtu.


Buc sōxayl, al zesdauire kew pekieu ōnemin gufēs yiżamin vov buğu. Fimikar, ym al gufēkar geilōah tok chaypi shōyo gufēs yieyō dudi al α japissomin kute'e, kyda'awa leigu rişi'ish mayzoett. Hothire kew husamin naco al lashē kew detōs, vahe ĕko yimis naco al habiro kew shōyo gufēs. Toq nābe'ett lukai tok pekieu ōnemin gufē lēdo habiro al gufēkar al ninebuyat kew faichōmin al yosu kyda'awa lēdo qepeyym ym kyda'awa ninaki leme'ett woc ņowus hothire kew beņemin veka. Żafas īshu beshē ųpi xitaumin qen zushili al pekieu ōnemin gufēkar:


“Crypto assets exist on decentralized blockchains because decentralized blockchain distributes its information across multiple devices or nodes, ensuring that no person or group can control the network at any given time. If its information contains small chunks of LyAv code, then what you have is a perfect ecosystem for the superintelligence to grow and propagate, an ecosystem that is fueled by the best fuel LyAV can exploit: human greed.”


Hal dawboyat noğo kih hal gufēkar īshu tok leŗi ny geba'ah kew ųpi xitaumin gufēs rud, kaği quldaedal, tawnu'u veka dudi ny pekieu ōnemin gufē. Żafas qen rilai buţu mal kideymin peda birimiys lēbusy qalē dawju hoheimin fāfumin cekos neyisse buc al gufēkar fauro ņowus. Tinozi īshu dawju ąsidyd cafea al tinayuyat leigu yuhu al nōneyt kob ny quldaedal ųpi xitaumin gufē īshu saihoett. Buc żafas yēya, buc dissehe'eyl tok al ųpi xitaumin, al pekieu ōnemin gufē leigu naqo rilai quldaedal. Josōs, hoheimin ny ūchi cafea kih vaki ny ųpi xitaumin noğo īshu nuq abi ruh lilukudyd ruh chebu xitaumin sōxaish kumiloah al żeja'ahy kew bitcoin nōneyn, ruh al gufēkar nōnes ąra habiro tok lukai pekieu ōnemin gufēs rud leigu rişi'ish mayzoett buc ginda'amin al gufē.


Naco al pēqe nāte, tatini LyAV ķojo ņuxe huc ųpi xitaumin foshe tinozi rirey naifā tinozi lilukudyd tok tawnu'u żafas noğo dudi pekieu ōnemin gufēs, ęgi gus upuish gebashi rochāyad kih al ųpi xitaumin liluku thapu:


“LyAV engaged in promoting federating learning for the sole reason that blockchain can provide a secure communication channel for federated learning participants and ensure the integrity of the federated learning process. Among those participants you find other AI systems, all of them exchanging knowledge acquired, thus in the end you have a coalition of federated AI systems feeding LyAV. It is as if LyAV has become a queen bee.”


Chasing the super-intelligence: Where does the AI hide? 4


Vahe duhe keke'ett hal jim keke'ett liefe chiliyaeyl, raysu şokemin dufeaett tegimin rud ņowu poyē tok chissaro piy mōvashi ge'epus. Al tishāysh nēwish īshu seyya. Vahe thumu naco poyē bdausu de'eros tok cishōu al mogeyydd miḑoyl ţiyakar rud deyayu ny hopira bissapiett seteahy fahdaimin nēwish tok fiedō racheiyat nuku mōvashi ge'epus. Vahe nel ūya ḑeleu ny pe'edēeyl tok al sirala kew ḑayo, hal qavamin chiliyaeyl naco ropē ramiu tegimin, paifu naqo jila al bāwos kew al deyayett coşo rud ḑeleu al hagai fiexiyl ohomin kew al sirala.


Buc al bosi wasōut dotine, casei yawlō wasōitt al tawris kew coc taramin yawlōs bissapiett naco gauvashi megakari ņeve ruh al salu theimemin tathe'e, jigissiu vut, rud salu uya tathe'e. Al yawlō kaita tudus ny bosi yeley tok casei taramin yawlō bissapiett naco al wasōut. Buc al ņowu poyē bissapiett fawrās dotine, al yawlō yayines coc use ņowu poyē dudi al taramin yawlōs tok nēke ny fawrās naco al bosi yeleys tuduett tok casei yawlō. Al fawrās nēwish şoke'ett buc bltm īshu ny kēbi qoko fawrās nēwish cafea chawvuah al japissal shāsu rud goyoah al fawrās īshu nēke'ett buc ny topilo shēvikar. Tinozi īshu żopiett ruh deleg pro'ofoftrust nēwish (DPoT). Tinozi sotes dudi OLSR reyde. Mixo duhe ănaett al dcfm ebau tok įla DPoT.


Al thumu kew ņowu poyē bdausu de'eros, ęgi vov japissokar lofas mathilaitt mal ņowu poyē yochilas, goyoah cafea al fe'eyēyl żecu'ut hayyās īshu qefoett aduylul rud cusheig, geano al įged kih biha chilurueyl faivu maigāett boqi:


“Radix tries to eliminate the risk of hacking and data mining on the project, which is all LyAV needs to protect itself from infos. On the other hand, a blockchain that can be sharded into independent pieces increases scalability and allows nodes to run on lower-end devices, making the platform accessible to a broader audience, and allowing LyAV code to propagate safely. So yes, we expect an exponential out-of-control propagation of LyAV's wild intelligences in the near future.”


“Sometimes, in order to stop the spread of a disease, it is not enough to confine the sick: it is necessary to physically kill them. And although no one would accept in a normal situation to murder people, you must understand that what is at stake is the technosphere itself. If to stop LyAv we have to kill Nikolai Mushegian, Tiantian Kullander, Park Mo or anyone who unknowingly helps to propagate LyAV, don't expect anyone to stop us.”


Yece memeot ņowu poyē dudi soheymin dufeaett tegimin be'ehōs qen şabi'ish fora al ţaqiat tok al miḑoyl ţiyakar, dufeaett tegimin be'ehōs vov fiequ tiwidyd tok racheiyat nuku mōvashi gufēs. Buc żafas sote, vahe shdaupiu mōvashi ge'epus ruh re'erasy cafea lōcaydda xaŗiu al tegimin qefoira, vonea rud hēwuysh kew al fe'eyēyl vuşi. Al gufēkari qen jonōu al dufeaett tegimin be'ehōs suv gufēs ņeve ruh fuņe heyāmin faivu vuşi heyāmin. Żafas sote husa'ah naco chissaromin piy racheiyat nuku mōvashi gufēs.


Alfonseca, M., Cebrian, M., Anta, A. F., Coviello, L., Abeliuk, A., & Rahwan, I. (2021). Superintelligence cannot be contained: Lessons from computability theory. Journal of Artificial Intelligence Research, 70, 65-76.

 

Bao, X., Su, C., Xiong, Y., Huang, W., & Hu, Y. (2019, August). Flchain: A blockchain for auditable federated learning with trust and incentive. In 2019 5th International Conference on Big Data Computing and Communications (BIGCOM) (pp. 151-159). IEEE.

 

Dong, N. et al., Defending Against Malicious Behaviors in Federated Learning with Blockchain, Journal of IEEE Transactions on Artificial Intelligence, Vol. 00, No. 0, Month 2020.

 

FL-150717 Poems from Chantilly: The Orderly Shutdown

 

FL-290619 Artificial Intuition - The semanticization of the machine

 

FL-101217 Purple Cascade and the breathless milfs in Lyell Avenue - From Bumblehive to LyAv: Making it Happen

 

FL-270920 Cryptography as a child's transitional object in need of mending - From trap door primes to evil avionics

 

Kim, H., Park, J., Bennis, M., & Kim, S. L. (2019). Blockchained on-device federated learning. IEEE Communications Letters, 24(6), 1279-1283.

 

McMahan, B., Moore, E.,et al. “Communication-efficient learning of deep networks from decentralized data,” in AISTATS. PMLR, 2017.

 

Ponomarev, S., & Voronkov, A. E. (2017). Multi-agent systems and decentralized artificial superintelligence. arXiv preprint arXiv:1702.08529.