You don't say this, but am I correct that the ideal next step here is: someone founds a startup to provide this as a product/service?
Yeah, I didn't say this, but it would be great if there was a dedicated startup! The tech would necessarily need to be open source, but support could be the business model. That, or the startup could simply be non-profit and funded by Longview or similar:
https://www.longview.org/request-for-proposals-on-hardware-enabled-mechanisms-hems-for-ai-verification/
Things are moving fast though, and by next week I'll know more about some specific company's ambitions and roadmaps. Can share this when this info is public.
Regardless, more commercial engagement is needed.
Fieldbuilding for AI verification is beginning. A consensus for what to build, what key problems to solve, and who to get in on the problem is emerging. Last week, ~40 people in total, including independent researchers and representatives from various companies, think tanks, academic institutions and non-profit organisations met for multiple days to share ideas, identify challenges, and create actionable roadmaps for preparing verification mechanisms for future international AI agreements. The workshop was initiated by the Future of Life Institute and included the following participants
among many others.
Why this needs to happen now
The urgency and neglectedness of this challenge is underscored by recent comments by frontier AI company leadership and government representatives:
Dario Amodei, CEO of Anthropic:
“The only world in which I can see full restraint is one in which some truly reliable verification is possible.”
Ding Xuexiang, Chinese Vice Premier, speaking about AI at Davos in January 2025:
“If countries are left to descend into a disorderly competition, it would turn into a ‘gray rhino’ right in front of us.” (a visible but ignored risk with serious consequences.)
“It is like driving a car on the expressway. The driver would not feel safe to step on the gas pedal if he is not sure the brake is functional.”
JD Vance, Vice President of the United States of America:1
“Part of this arms race component is if we take a pause, does the People’s Republic of China not take a pause? And then we find ourselves all enslaved to P.R.C.-mediated A.I.?”
Beyond international coordination, there are further use cases for verification of what AI compute is used for: Safeguards against authoritarian misuse of AI (e.g., identifying protestors or political opponents), enabling secure use of foreign compute in domestic critical infrastructure and more.
It needs to become possible to detect dishonesty about AI development and use, from the outside, without needing to leak sensitive data.2 The stakes continue to rise.
An orphaned problem
It is possible for an important problem to be noticed, but unaddressed by a large number of influential people who would be able to make a solution happen. This is what the field of AI verification has been lacking so far: people meeting, and agreeing on what the next steps are, what challenges deserve the most attention, and who does what.3
The workshop
Over two days in downtown Berkeley, the participants presented their background and relevant work so far, shared insights, and discussed strategies and roadmaps for moving the technology, commercial deployment and the international diplomatic and scientific “bridges” forward.
Not nearly enough
If I gave the impression that the problem is getting adequate attention now, it is not. “All hands on deck” may be the title of this post, and the interest in verification work is growing, but the development of technical demos and a proper research community is still in its infant stages and bottlenecked by talent, funding, and coordination capacity.
This is a field where a single person with the right skills can move the needle. We need:
Engineers and scientists: FPGA engineers, datacenter networking engineers, silicon photonics experts, analog/mixed-signal engineers, cryptographers, formal verification researchers, ML systems engineers, cybersecurity and hardware security specialists, high-frequency trading hardware specialists and independent hackers who love to build and break things.
Entrepreneurs and founders: Enterprise sales people, venture capitalists, public grantmakers and incubators, and established companies opening up new product lines. This is in order to prepare the supply chains and business ecosystems and precedents needed to scale up deployment. Verification can have purely commercial use cases, for example for demonstrating faithful genAI inference.5
Policy and diplomacy: Technology policy researchers, arms control and treaty verification veterans, diplomats, and people with connections to —or expertise— in the Chinese AI ecosystem.
Funding and operations: Funders, fundraisers, and program managers who can help coordinate a distributed research effort.
If any of this describes you, or if you bring adjacent skills and learn fast, reach out.
naci.c@protonmail.com
Let us use what (perhaps little) time we have left for creating better consensus on AI risks, for building a datacenter lie detector, for preventing and finding hidden AI projects, and for defeating Moloch.
Join us.
1 Answer to the question: “Do you think that the U.S. government is capable in a scenario — not like the ultimate Skynet scenario — but just a scenario where A.I. seems to be getting out of control in some way, of taking a pause?”
2 In plain English: We need ways for an inspector to walk into a datacenter in Shenzhen or Tennessee and cryptographically prove what inference and training happened, without increasing the risk of exposing IP such as model weights or training data.
3 For more details on this, I recommend the excellent post “There should be ‘general managers’ for more of the world’s important problems”.
4 See my previous post on a “border patrol device” for AI datacenters.
5 While Kimi’s Vendor Verifier may give the impression that this is a solved problem, it only works for open weights models to run locally for comparison. Verifying inference of proprietary models would require third-party-attested, or hardware-attested deployment.