Longterm Wiki

Compute Monitoring

monitoringpolicyPath: /knowledge-base/responses/monitoring/
E464Entity ID (EID)
← Back to page12 backlinksQuality: 69Updated: 2026-03-13
Page Recorddatabase.json — merged from MDX frontmatter + Entity YAML + computed metrics at build time
{
  "id": "monitoring",
  "numericId": null,
  "path": "/knowledge-base/responses/monitoring/",
  "filePath": "knowledge-base/responses/monitoring.mdx",
  "title": "Compute Monitoring",
  "quality": 69,
  "readerImportance": 63,
  "researchImportance": 49,
  "tacticalValue": null,
  "contentFormat": "article",
  "tractability": null,
  "neglectedness": null,
  "uncertainty": null,
  "causalLevel": null,
  "lastUpdated": "2026-03-13",
  "dateCreated": "2026-02-15",
  "llmSummary": "Analyzes two compute monitoring approaches: cloud KYC (implementable in 1-2 years, covers ~60% of frontier training via AWS/Azure/Google) and hardware governance (3-5 year timeline). Cloud KYC targets 10^26 FLOP threshold (~\\$10-100M training cost), but on-premise compute and jurisdictional arbitrage enable evasion; hardware-level monitoring could address this but faces substantial technical challenges.",
  "description": "This framework analyzes compute monitoring approaches for AI governance, finding that cloud KYC (targeting 10^26 FLOP threshold) is implementable now via the three major providers controlling 60%+ of cloud infrastructure, while hardware-level governance faces 3-5 year development timelines. The EU AI Act uses a lower 10^25 FLOP threshold. Evasion through on-premise compute and jurisdictional arbitrage remains the primary limitation.",
  "ratings": {
    "novelty": 4.5,
    "rigor": 6.5,
    "actionability": 7,
    "completeness": 7.5
  },
  "category": "responses",
  "subcategory": "compute-governance",
  "clusters": [
    "ai-safety",
    "governance"
  ],
  "metrics": {
    "wordCount": 4436,
    "tableCount": 7,
    "diagramCount": 1,
    "internalLinks": 29,
    "externalLinks": 0,
    "footnoteCount": 0,
    "bulletRatio": 0.07,
    "sectionCount": 12,
    "hasOverview": true,
    "structuralScore": 10
  },
  "suggestedQuality": 67,
  "updateFrequency": 21,
  "evergreen": true,
  "wordCount": 4436,
  "unconvertedLinks": [],
  "unconvertedLinkCount": 0,
  "convertedLinkCount": 24,
  "backlinkCount": 12,
  "hallucinationRisk": {
    "level": "medium",
    "score": 60,
    "factors": [
      "no-citations",
      "few-external-sources"
    ]
  },
  "entityType": "policy",
  "redundancy": {
    "maxSimilarity": 22,
    "similarPages": [
      {
        "id": "export-controls",
        "title": "AI Chip Export Controls",
        "path": "/knowledge-base/responses/export-controls/",
        "similarity": 22
      },
      {
        "id": "international-regimes",
        "title": "International Compute Regimes",
        "path": "/knowledge-base/responses/international-regimes/",
        "similarity": 22
      },
      {
        "id": "authoritarian-tools-diffusion",
        "title": "Authoritarian Tools Diffusion Model",
        "path": "/knowledge-base/models/authoritarian-tools-diffusion/",
        "similarity": 21
      },
      {
        "id": "thresholds",
        "title": "Compute Thresholds",
        "path": "/knowledge-base/responses/thresholds/",
        "similarity": 21
      },
      {
        "id": "voluntary-commitments",
        "title": "Voluntary Industry Commitments",
        "path": "/knowledge-base/responses/voluntary-commitments/",
        "similarity": 21
      }
    ]
  },
  "coverage": {
    "passing": 5,
    "total": 13,
    "targets": {
      "tables": 18,
      "diagrams": 2,
      "internalLinks": 35,
      "externalLinks": 22,
      "footnotes": 13,
      "references": 13
    },
    "actuals": {
      "tables": 7,
      "diagrams": 1,
      "internalLinks": 29,
      "externalLinks": 0,
      "footnotes": 0,
      "references": 15,
      "quotesWithQuotes": 0,
      "quotesTotal": 0,
      "accuracyChecked": 0,
      "accuracyTotal": 0
    },
    "items": {
      "llmSummary": "green",
      "schedule": "green",
      "entity": "green",
      "editHistory": "red",
      "overview": "green",
      "tables": "amber",
      "diagrams": "amber",
      "internalLinks": "amber",
      "externalLinks": "red",
      "footnotes": "red",
      "references": "green",
      "quotes": "red",
      "accuracy": "red"
    },
    "ratingsString": "N:4.5 R:6.5 A:7 C:7.5"
  },
  "readerRank": 210,
  "researchRank": 288,
  "recommendedScore": 191.36
}
External Links
{
  "lesswrong": "https://www.lesswrong.com/tag/compute-governance"
}
Backlinks (12)
idtitletyperelationship
hardware-enabled-governanceHardware-Enabled Governancepolicy
thresholdsCompute Thresholdspolicy
international-regimesInternational Compute Regimespolicy
accident-risksAI Accident Risk Cruxescrux
misuse-risksAI Misuse Risk Cruxescrux
ai-compute-scaling-metricsAI Compute Scaling Metricsanalysis
bioweapons-attack-chainBioweapons Attack Chain Modelanalysis
short-timeline-policy-implicationsShort Timeline Policy Implicationsanalysis
holden-karnofskyHolden Karnofskyperson
coordination-techAI Governance Coordination Technologiesapproach
export-controlsAI Chip Export Controlspolicy
governance-overviewAI Governance & Policy (Overview)concept
Longterm Wiki