Comment by ziml77
5 days ago
And of course if it has access to run the code that it's developing, it can also do anything it wants because it can just add code that performs the operations it is trying.
5 days ago
And of course if it has access to run the code that it's developing, it can also do anything it wants because it can just add code that performs the operations it is trying.
No comments yet
Contribute on Hacker News ↗