• Lionir [he/him]@beehaw.org
    link
    fedilink
    arrow-up
    10
    ·
    1 year ago

    This is a false equivalence. Encryption only works if nobody can decrypt it. LLMs work even if you censor illegal content from their output.

    • 👁️👄👁️@lemm.ee
      link
      fedilink
      English
      arrow-up
      4
      ·
      1 year ago

      You miss the point. My point is that if you want to have a consistent view point, you need to acknowledge and defend the harmful sides. Encryption can objectively cause harm, but it should absolutely still be defended.

      • Lionir [he/him]@beehaw.org
        link
        fedilink
        arrow-up
        9
        ·
        1 year ago

        This is just enlightened centrism. No. Nobody needs to defend the harms done by technology.

        We can accept the harm if the good is worth it - we have no need to defend it.

        LLMs can work without the harm.

        It makes sense to make technology better by reducing the harm they cause when it is possible to do so.

        • janguv@lemmy.dbzer0.com
          link
          fedilink
          arrow-up
          2
          ·
          1 year ago

          He would have been better off not talking about harm directly but the ability to cause harm; he actually used that wording in an earlier comment in this chain. (Basically strawmanned himself lol.)

          Because as a standalone argument for encryption, it’s fairly sound – hey, the ability of somebody to cause harm via encrypted messaging channels is the selfsame ability to do good [/prevent spying/protect privacy, whistleblowers/etc], and since the good outweighs the bad, we have to protect the ability to cause harm (sadly).

          The problem is it’s still disanalogous – the ability to cause harm via LLM use is not the selfsame ability to do good (or to do otherwise what you want). My LLM’s refusing to tell me how to make a bomb has no impact on its ability to tell me how to make a pasta bake.

      • Solar Bear@slrpnk.net
        link
        fedilink
        English
        arrow-up
        6
        ·
        edit-2
        1 year ago

        What the fuck is this “you should defend harm” bullshit, did you hit your head during an entry level philosophy class or something?

        The reason we defend encryption even though it can be used for harm is because breaking it means you can’t use it for good, and that’s far worse. We don’t defend the harm it can do in and of itself; why the hell would we? We defend it in spite of the harm because the good greatly outweighs the harm and they cannot be separated. The same isn’t true for LLMs.

        • 👁️👄👁️@lemm.ee
          link
          fedilink
          English
          arrow-up
          2
          ·
          1 year ago

          We don’t believe that at all, we believe privacy is a human right. Also you’re just objectively wrong about LLMs. Offline uncensored LLMs already exist, and will perpetually exist. We don’t defend tools doing harm, we acknowledge it.

          • Solar Bear@slrpnk.net
            link
            fedilink
            English
            arrow-up
            3
            ·
            1 year ago

            We don’t believe that at all, we believe privacy is a human right.

            That’s just a different way to phrase what I said about defending the good side of encryption.

            Offline uncensored LLMs already exist, and will perpetually exist

            I didn’t say they don’t exist, I said that the help and harm aren’t inseparable like with encryption.

            We don’t defend tools doing harm, we acknowledge it.

            “My point is that if you want to have a consistent view point, you need to acknowledge and defend the harmful sides.”

            If you want to walk it back, fine, but don’t pretend like you didn’t say it.

    • jasory@programming.dev
      link
      fedilink
      arrow-up
      2
      ·
      1 year ago

      Encryption only works if certain parties can’t decrypt it. Strong encryption means that the parties are everyone except the intended recipient, weak encryption still works even if 1 percent of the eavesdroppers can decrypt it.

      • Lionir [he/him]@beehaw.org
        link
        fedilink
        arrow-up
        2
        ·
        1 year ago

        I mean, I don’t understand the point of an encryption that people can decrypt without it being intended. Just seems like theatre to me.

        But yeah, obviously the intended parties have to be able to decrypt it. I messed up in my wording.

        • jasory@programming.dev
          link
          fedilink
          arrow-up
          1
          ·
          1 year ago

          You realise that most encryption can be decrypted by third-party? Many cryptography libraries have huge flaws, even the Handbook of Applied Cryptography was encouraging using Damgard et al’s parameters for prime selection even though the original authors never claimed the accuracy that others assumed (without basis). Even now, can you guess how many cryptography libraries would be broken if someone found a BPSW pseudoprime? And we have arguments that they probably exist, but crypto developers just ignore it either out of ignorance or laziness.

          In summary, it’s all theatre, you just want to deny access to enough parties that it makes you comfortable.