GeistHaus
log in · sign up

Two alignment threat models

aligned.substack.com

Why under-elicitation and scheming are both important to address

1 page links to this URL