Why are people reluctant to believe in artificial intelligence?

Original link: https://onojyun.com/2022/06/07/6189/

△ 158|Why do people not want to believe in artificial intelligence?

The original title should have been “Why I don’t want to believe in artificial intelligence? “, even when I saw the title of this “I” generation, I had a “who the hell are you, don’t you think it’s none of my business” mentality, so I carefully changed the title, But it is true that “don’t believe in artificial intelligence” is not my point of view, but I have asked many people this question, and the general answer I get is “distrust”.

It’s just that this “distrust” has a lot to play with. In order to avoid the debate between the “artificial intelligence faction” and the “man will conquer the heavens faction” and me, “the scumbags who wish to see artificial intelligence betray human beings and then create a plot of destruction”, today’s article is just to state me The content collected is not to provoke war and deny the other party. If so, I apologize in advance – because obviously I did it on purpose.

Stay away from Simplified Chinese internet as it will bring misfortune

“It’s not a question of whether I believe it or not, it’s a question of how much privacy I still have to be spied on.”

In the view of distrusting the so-called “artificial intelligence”, of course there will be such a generalization conclusion, which is also a kind of conclusion that I highly respect. It’s not one size fits all, but in China’s simplified Chinese network environment, everyone compares to see who is worse and who has no bottom line , so don’t carry a kind of “wow, artificial intelligence will bring a brand new metaverse to change human life. “The passion and excitement come to expect it in itself. This is the core tone of this key – a fundamental distrust of the Simplified Chinese web.

Because I was a law student, I carefully read the ” Privacy Policy” of various domestic input methods when I was bored. . To sum it up in one sentence: these domestic input methods, after recording a large amount of private data of users, not only have to be put into advertising alliances, but also have a supreme law that can fight against all the so-called “privacy protection” clauses – “mandatory disclosure”. That is to say, user data can be unconditionally disclosed under those vague definitions, and these vague definitions are equivalent to “relevant departments”, “relevant leaders”, “experts and scholars”, “according to foreign media” and so on.

In other words, the “artificial intelligence” it breeds in a network environment without privacy protection can only be a deformed product. It seems that it recommends the products “thinking” to users through “algorithms”. In fact, these data follow a user’s portrait, and this portrait is related to a user’s most basic home address, mobile phone number, registered email address , purchase records, and even calculate whether marriage, childbearing, gender, sexual orientation, and even possible overlapping communication between people.

In fact, this system has always existed, and when it was brought to the table as a “means”, everyone mistakenly thought that it was a system to protect people’s livelihood – the so-called “space-time companion”.

All Internet products that cannot be built in a relatively privacy-protected environment are themselves a game of being more evil than anyone else. Those “We will never record any user data” written in the product introduction column have become a “selling point”. . Not to mention artificial intelligence itself, if it is to be applied to everyone’s closely related life, it can collect far more things than we can imagine – and its calculations will not be wrong.

Just imagine, a man often buys women’s underwear on shopping software, how should artificial intelligence calculate him? If he ended up buying a lot of tape, masks, tarps, large black pockets, etc., then the AI ​​might report him directly to the Public Security Bureau as a key observer.

“Open source” and “non-open source”, “thieves go through the back door” and “open the door to let thieves in”

“The factor that causes software to reserve backdoors is not software developers, but more often a political factor.”

“Opening the back door” to software is actually a very ambiguous topic. Even if someone caught the package and saw the reserved back door in the domestic software, it would definitely be treated as a bug and dealt with. If the trouble is a little bit fierce, maybe you can see the software developer come forward to explain it indifferently; but in most cases, it is silently “fixed” in the “next version”.

I don’t know if you have seen “domestic films” obtained by cracking a company’s video surveillance equipment in your film reading experience. In fact, I have been thinking about a question, since it is so easy to crack, why does this company not upgrade their equipment to avoid being used by criminals?

Of course, we can’t go into the depths of the company’s products here, lest they end this “happening” with the most fundamental solution – the solution to the person who asked the problem.

In the past few years, because macOS is used, it is not clear whether the Windows operating system is still the same as the previous model – it is difficult to download a software, and you have to click several layers of options to avoid being bundled and installed. Of course, there is also another “selling point” in this process. Those software vendors who relied on bundled installations to increase the number of users’ installations in the past have begun to be “security stewards” to ensure that users will no longer be harassed by bundled software.

Think about it when you put it into artificial intelligence – for example, if there is a product such as a smart mirror at home, then its camera is really only for the needs of “artificial intelligence”, or does it have other “back doors” that can be used by others use? The intelligent voice assistant is always at our disposal, but is it secretly uploading my conversations with others at other times? This is not something we can discuss, but we can think in the worst direction.

Imagine a criminal who happened to have a smart device in his home. When he and his accomplices were discussing how to rob, the smart device “just” recorded the conversation and uploaded it, and finally their crime was stopped. How should the way to detect them be declared to the outside world? This is probably the so-called “technical means”.

Of course, this also has another kind of philosophical and legal thinking-privacy and prophetic crime, which can be discussed in the future.

“Tell everyone a joke: he actually wants to make security software!”

Artificial intelligence will always have a “fig leaf”, and uncovering it requires re-discussing the existence of artificial intelligence

“The best artificial intelligence starts with a big shuffle, publishing everyone’s open house records, and talking about privacy when they’re all fucking naked?”

The fig leaf of artificial intelligence, as the name suggests, is privacy. Because if it is to be “intelligent”, it must have conditions and formulas. The formula is the core competitiveness of the business field, but the condition is the “privacy” that people need to pay. There are many bloggers who have talked about Internet privacy, so here we go.

I personally think that “privacy” is a relative element, but it should have an absolute constraint – that is, a traceability system.

If the “privacy” cannot be traced back to the actual user behind an account subject, then the “privacy” is relatively safe, no matter how much “preparation for rape” the account has searched;

If “privacy” can be traced back, enough conditions can be clearly attached to a real user, and then applied to the formula to calculate various humanized predictions for it, then this “privacy” “Obviously like a “plaintext password”, it can fully feed back a user’s real user portrait;

Of course, in the discussion of “privacy”, there is also a compromise area-that is, adding a predictive system. For example, the user who just searched for “preparations for rape” on the Internet, the content he searched obviously contained “criminal intent”, his data was uploaded as an element of “crime prevention”. Other information that triggers the prediction system is regarded as “relatively private” data and cannot be traced back to specific real users.

But unfortunately, even such a compromise will still provoke public outrage. For example, Apple’s previous plan to report possible “child sex crimes” pictures in users’ photo albums to security agencies. The plan was shelved because opposition was too strong. This pre-judgment system happens to be the “fig cloth” of artificial intelligence. Everyone knows what is below, but everyone has their own considerations whether to open it or not. Some people think that it is better to have a piece that is not in the way than to be completely naked; some people have already begun to imagine how huge it is before seeing what is underneath; When others see his mind, they must oppose its existence. The reason is: although it does not make me have illusions, it will always make some people imagine.

Can artificial intelligence really replace human existence?

人们为什么不愿意相信人工智能?插图 “New Century エヴァンゲリオン”

I really like a setting in “EVA” – the MAGI computer, don’t look at it as an animation in 1995, but the discussion of many things is still worth discussing today. The MAGI computer is indeed an artificial intelligence-like existence, but the point of its intelligence is that Dr. Naoko Akagi implanted his own brain, personality and consciousness into the supercomputer as a carrier. Taking the Three Doctors of the East as the prototype in the Bible, Naoko Akagi as a Doctor, Naoko Akagi as a mother and Naoko Akagi as a woman form an internal contradictory system. The veto system is a conception of the application of “ego”, “id” and “superego”.

When Akagi Naoko’s woman, Akagi Ritsuko, was determined to kill the man she and her mother fell in love with, she decided to let MAGI decide to self-destruct. Unexpectedly, as a woman’s supercomputer, she finally voted down the decision-she as a woman A woman who betrayed her love for her daughter as a mother, and her hatred for Rei Ayanami as a doctor.

Although this artificial intelligence computer is artistic processing, it also leaves many points worth thinking about – the human consciousness as the carrier becomes the basis of artificial intelligence, then can this system itself be called “artificial intelligence” ”, it seems that it has brought too many subjective elements.

As a whole argument, I used another extreme method to think in my novel “Non-Public Dreamland” – if the privacy of human beings is absolutely private, what kind of carrier should be used? to carry them? And this kind of absolute privacy will inevitably destroy some kind of “relative” existence . If I can revise this novel this year, it is worth taking it out and discussing with you again the topic of “whether artificial intelligence can replace humans”.

In fact, in the conception process of these artificial intelligences, there is an unavoidable paradox-that is , the final maintenance and control of artificial intelligence still have to be handed over to humans. If one day they really gain a sense of freedom, at least human beings can be the ultimate insurance for the last “unplugged”.

The day humans discover that the conscious and subconscious can be separated, we will find a way to curb crime. “9 TH ” is the spinner of fate, which is the foundation of the subconscious, and will never lie and deceive; “10 TH ” is the measurer of fate, which is the foundation of consciousness, and they come to judge everyone’s subconscious Whether there is killing intent or not; and we, the Moor Tower we protect, are decision makers with scissors, and it is up to us to decide whether to cut the spinning thread that will lead to disaster. to operate.

——”Non-Public Dreamland”

This article is reproduced from: https://onojyun.com/2022/06/07/6189/
This site is for inclusion only, and the copyright belongs to the original author.

Leave a Comment