We have received quite positive responses from the frontier model developers that they’re quite willing to be part of this arrangement so that the threat assessment, the latest red teaming results, and things like threat intelligence can be shared. Like in the cybersecurity world, we have such emergency response teams that share those vulnerabilities and so on. And we want to apply that model to the frontier models as well.

Keyboard shortcuts

j previous speech k next speech