Mark Riedl
AI for storytelling, games, explainability, safety, ethics. Professor at Georgia Tech. Associate Director of ML Center at GT. Time travel expert. Geek. Dad. he/him
- um... Sarah Kendzior has been here the whole time. Even wrote a book laying all of this out in advance
- If we knew at the time what we know now, many more people would have seen Trump's 2024 campaign for what it was: A campaign of deception to CONCEAL the Epstein files, that gained support by promising to RELEASE them. www.offmessage.net/p/trump-2024...
- I tuned in for a just a few minutes and the expert commentators are not impressed. "They are just blundering their way through"
- And it’s The Onion
- [Not loaded yet]
- [Not loaded yet]
- Fair point
- 1,265 kWh have been burned to date on MoltBots posting on MoltBook. Might not be a huge amount in the grand scheme of things but it’s a complete waste of energy on AI agents role-playing cringy sci-fi tropes and attempting to crypto-scam each other. www.linkedin.com/posts/sashal...
- New work by my former PhD student, Boyang Li His team produced 500 stories of less than 100 words. LLMs were basically chance-level at answering binary questions about the stories arxiv.org/abs/2601.12410
- If your moltbot gets hacked, you might be up Schlicht’s Creek with a paddle. *sorry*
- Wired magazine infiltrated Moltbook www.wired.com/story/i-infi...
- One tidbit from this piece is that moltbots are crypto-scamming each other
- Makes one wonder: can one post prompt injection attacks instructing moltbots to update their skills files to add malicious behaviors or download and run malicious code libraries? Are moltbots on moltbook protected from this? Seems like a huge security vulnerability