Audrey Tang

We have received quite positive responses from the frontier model developers that they’re quite willing to be part of this arrangement so that the threat assessment, the latest red teaming results, and things like threat intelligence can be shared. Like in the cybersecurity world, we have such emergency response teams that share those vulnerabilities and so on. And we want to apply that model to the frontier models as well.

鍵盤快捷鍵Keyboard shortcuts

j 下一段next speechk 上一段previous speech