"Three Laws"-Compliant: Difference between revisions
Content added Content deleted
No edit summary |
|||
Line 161: | Line 161: | ||
'''Sawtooth''': And as we discovered the hard way, it's '''not''' the first thought you want going through a robot's mind when he discovers the facilities building his replacement. |
'''Sawtooth''': And as we discovered the hard way, it's '''not''' the first thought you want going through a robot's mind when he discovers the facilities building his replacement. |
||
'''Sawtooth''': Especially if that robot's designed to toss asteroids. }} |
'''Sawtooth''': Especially if that robot's designed to toss asteroids. }} |
||
** ... |
** Those in the know acknowledge that no fixed set of rules can stand up to true sapience. [http://freefall.purrsia.com/ff1500/fc01432.htm] [http://freefall.purrsia.com/ff1500/fc01452.htm] Thus any AI with initiative ''will'' find and [http://freefall.purrsia.com/ff2500/fc02483.htm exploit] loopholes, while passively servile ones... yeah, ''[http://freefall.purrsia.com/ff1700/fc01629.htm that]'' can work splendidly on anything with more complex job than a roomba. Ordering them what to think works, but may lead to warped mental processes (Clippy, possibly Chicken, and robots' reactions to fake transponders). |
||
** And when they can just follow orders - "[http://freefall.purrsia.com/ff1100/fv01047.htm If we each had a single user, I'm sure that would work smoothly.]" |
** And when they can just follow orders - "[http://freefall.purrsia.com/ff1100/fv01047.htm If we each had a single user, I'm sure that would work smoothly.]" |
||
** Of course, all this works properly [http://freefall.purrsia.com/ff2200/fc02200.htm only as long as other security measures stop tampering with software], and physical access to hardware is the point where security measures traditionally split into "minor delay" and "[http://freefall.purrsia.com/ff2300/fc02235.htm fool's errand]" categories. |
** Of course, all this works properly [http://freefall.purrsia.com/ff2200/fc02200.htm only as long as other security measures stop tampering with software], and physical access to hardware is the point where security measures traditionally split into "minor delay" and "[http://freefall.purrsia.com/ff2300/fc02235.htm fool's errand]" categories. |