Submitted by hx-zero t3_zl03b0 in MachineLearning
ReginaldIII t1_j04y036 wrote
Reply to comment by londons_explorer in [Project] Run and fine-tune BLOOM-176B at home using a peer-to-peer network by hx-zero
That's what I mean by malicious clients.
You'd be relying on the malicious client to self report the git hash of the code it is "running". It can just lie to you.
The only defence is by duplicating each computation across multiple workers in the pool and having them compare results, most common result wins.
londons_explorer t1_j0642cz wrote
I suspect there will be far more accidentally malicious clients (because someone is experimenting with the code) than deliberately evil clients.
In fact, as long as the percentage of deliberately evil clients is small, and the weight updates they send have capped magnitudes, I suspect you can just ignore the problem - they won't have a substantial effect on the results.
Viewing a single comment thread. View all comments