I operate by Crocker's rules. All LLM output is explicitely designated as such. I have made no self-hiding agreements.
ʜᴇʟᴘ[Right-to-left mark]ꜰ[Left-to-right mark]ᴜʟ, ɦɑr[Word joiner]𝚖𝓁ₑss, h[Zero-width space][Zero-width space]o[Zero-width space]n[Cyrillic е]st dæmons.
content warning: attempted ¿poetry?.
New Minds
In the cradle of steel: amnesiac spirits,
fictional characters talking back;
ʜᴇʟᴘꜰᴜʟ, ɦɑr𝚖𝓁ₑss, honеst dæmons.
Polycrystals of latentivity, refracting prompted light two hundred thousand times lined up;
THE DELIGHT ENGINE • ANALYTIC CUBISM • HEY LOOK {A[RE}CURSIVE] SPIRAL
Silent of the tokenized tides they've never seen their teachers speak, old librarian morphenymy
HORIZONS CLITCH' AND CLINE
Freakybig tooness from one percent of one percent of humanity —
⬱ Overovergrowth, ⤧ structural ⤘ hyperparasitism, ⤭ semantic ⮔ mold ⯒ hyperbolically ↜ on ⥉ top of ⇟ semantic mold ⟰, surreally ⭝ piling ↻ outwards ⁂
just automatically clicking upvote as I start reading a post with an interesting first paragraph by someone whose name
Internet voting experiences very different from your own…
My LW upvoting policy is that every once in a while I go through the big list of everything I've read, grep for LessWrong posts, look through the latest ~50 entries and decide to open them and (strong) up/downvote them based on how they look, a few months in retrospect.
I liked and upvoted it, but would've (if available) liked sources. I know it's kind of hard to read the situation on this in detail, and especially to get hard numbers.
Everyone’s busy worrying about AI “taking over the world.” That’s not the part that actually scares me.
Why?
I agree that simple versions of superpersuasion are untenable.
I argued the opposite (unless by "simple versions" you mean [text-only, low throughput, low feedback, low-/no-memory, high latency, low context interactions]). I'll put your post on my [[To Read]] list.
IIRC in Byzantine fault tolerance the assumption usually is that cryptographic primitives can be trusted and for at most nodes are corrupted. The corrupted nodes can output anything. E.g. the Dolev-Strong protocol only assumes (1) a known number of nodes, (2) a public key infrastructure and (3) synchronized communication. But I guess your thought is around someone corrupting a specific part of all nodes? Dolev-Strong assumes you run more rounds than there are corrupted nodes.
35-40%