Skip to content
Longterm Wiki
Navigation
Updated 2026-01-29HistoryData
Page StatusResponse
Edited 2 months ago3.5k words12 backlinksUpdated every 3 weeksOverdue by 45 days
70QualityGood •22.5ImportancePeripheral83.5ResearchHigh
Content8/13
SummaryScheduleEntityEdit history1Overview
Tables24/ ~14Diagrams3/ ~1Int. links13/ ~28Ext. links66/ ~18Footnotes0/ ~11References5/ ~11Quotes0Accuracy0RatingsN:6.8 R:7.2 A:7.5 C:7.8Backlinks12
Change History1
Extract wiki proposals as structured data#1417 weeks ago

Created two new data layers: 1. **Interventions** (broad categories): Extended `Intervention` schema with risk coverage matrix, ITN prioritization, funding data. Created `data/interventions.yaml` with 14 broad intervention categories. `InterventionCard`/`InterventionList` components. 2. **Proposals** (narrow, tactical): New `Proposal` data type for specific, speculative, actionable items extracted from wiki pages. Created `data/proposals.yaml` with 27 proposals across 6 domains (philanthropic, financial, governance, technical, biosecurity, field-building). Each has cost/EV estimates, honest concerns, feasibility, stance (collaborative/adversarial). `ProposalCard`/`ProposalList` components. Post-review fixes: Fixed 13 incorrect wikiPageId E-codes in interventions.yaml (used numeric IDs instead of entity slugs). Added Intervention + Proposal to schema validator. Extracted shared badge color maps from 4 components into `badge-styles.ts`. Removed unused `client:load` prop and `fundingShare` destructure.

Issues3
QualityRated 70 but structure suggests 100 (underrated by 30 points)
Links20 links could use <R> components
StaleLast edited 66 days ago - may need review

Hardware-Enabled Governance

Approach

Hardware-Enabled Governance

RAND analysis identifies attestation-based licensing as most feasible hardware-enabled governance mechanism with 5-10 year timeline, while 100,000+ export-controlled GPUs were smuggled to China in 2024 demonstrating urgent enforcement gaps. Location verification prototyped on H100 chips offers medium-high technical feasibility but raises significant privacy/abuse risks; appropriate only for narrow use cases like export control verification and large training run detection.

Related
Policies
US AI Chip Export Controls
Concepts
Compute ThresholdsInternational Compute Regimes
Approaches
Compute Monitoring
3.5k words · 12 backlinks

Quick Assessment

DimensionAssessmentEvidence
Technical FeasibilityMedium-HighLocation verification already prototyped on H100 chips; TPM technology widely deployed
Implementation Timeline5-10 yearsRequires chip design cycles (2-3 years) plus deployment; RAND estimates significant market penetration needed
Privacy RiskMedium-HighCould enable compute surveillance; delay-based verification reveals only coarse location data
Security RiskHighCreates new attack surfaces; must defend against state-level adversaries per RAND workshop
Abuse PotentialHighAuthoritarian regimes could misuse for suppression; requires international governance safeguards
Current StatusEarly ResearchRAND working paper (2024); Chip Security Act proposed in Congress; Nvidia piloting tracking software
GradeB-High potential but significant risks; appropriate only for narrow use cases

Overview

Hardware-enabled governance mechanisms (HEMs) represent a potentially powerful but controversial approach to AI governance: embedding monitoring and control capabilities directly into the AI chips and computing infrastructure used to train and deploy advanced AI systems. Unlike export controls that prevent initial access to hardware or compute thresholds that trigger regulatory requirements, HEMs would enable ongoing verification and enforcement even after hardware has been deployed.

The appeal is significant. RAND Corporation research argues that HEMs could "provide a new way of limiting the uses of U.S.-designed high-performance microchips" that complements existing controls. The policy urgency is real: an estimated 100,000 export-controlled GPUs were smuggled into China in 2024 alone, with some estimates ranging up to one million. If AI governance requires not just knowing who has advanced chips, but verifying how they're used, hardware-level mechanisms offer a potential solution. Remote attestation could verify that chips are running approved workloads; cryptographic licensing could prevent unauthorized large-scale training; geolocation constraints could enforce export controls on a continuing basis.

However, HEMs also raise serious concerns. Privacy implications, security risks from attack surfaces, potential for abuse by authoritarian regimes, and fundamental questions about appropriate scope of surveillance make this a highly contested intervention. A RAND workshop with 13 experts in April 2024 found that narrow-scope HEMs may be more feasible, whereas broader designs could pose greater security and misuse risks. Implementation would require unprecedented coordination between governments and chip manufacturers, with chip design cycles of 2-3 years before new features can reach production. HEMs represent high-risk, high-reward governance infrastructure that merits serious research while demanding careful attention to safeguards.

Policy Landscape and Current Developments

The policy debate around HEMs has accelerated significantly in 2024-2025, driven by concerns about enforcement of existing export controls.

Legislative Proposals

LegislationSponsorsKey ProvisionsStatus
Chip Security Act (CSA)Sen. Tom Cotton, Reps. Bill Huizenga, Bill FosterRequires geolocation tracking of GPUs; 180-day implementation timelineIntroduced May 2024
Foster Tracking BillRep. Bill Foster (D-IL)Embedded tracking technology; remote disable capability for unlicensed chipsIn preparation
AI Diffusion FrameworkBIS (Biden Admin)Three-tier country system; location verification for NVEU authorizationPublished Jan 2025; rescinded May 2025

Industry Response

ActorPositionActions
NvidiaCautious cooperationPiloting opt-in tracking software; explicitly states "no kill switch"
Semiconductor Industry AssociationOpposed to CSALetter urging reconsideration of "burdensome" tracking requirements
GoogleAlready implementingUses delay-based tracking for in-house TPU chips
ChinaStrongly opposedWarning Nvidia against tracking features; launched security investigation into Nvidia chips

Enforcement Gap

Current export controls face significant enforcement challenges:

MetricEstimateSource
Smuggled GPUs to China (2024)100,000+ (range: tens of thousands to 1 million)CNAS upcoming report
Value of chips diverted in 3 months$1 billionFinancial Times investigation
Entities added to Entity List (2025)65 new Chinese entitiesBIS actions
Tier 2 GPU cap (2025-2027)≈50,000 GPUsAI Diffusion Framework

Technical Mechanisms

Hardware-enabled governance encompasses several distinct technical approaches with different capabilities, costs, and risks:

Diagram (loading…)
flowchart TD
  subgraph DETECTION["Detection Mechanisms"]
      A[Remote Attestation] --> A1["Verify chip is running<br/>expected software"]
      B[Usage Metering] --> B1["Track compute consumption<br/>on-device"]
      C[Geolocation] --> C1["Verify physical location<br/>of hardware"]
  end

  subgraph CONTROL["Control Mechanisms"]
      D[Cryptographic Licensing] --> D1["Require authorization<br/>for operation"]
      E[Kill Switch] --> E1["Remote disable<br/>capability"]
      F[Workload Filtering] --> F1["Prevent specific<br/>computation patterns"]
  end

  subgraph GOVERNANCE["Governance Applications"]
      A1 --> G[Verify compliance]
      B1 --> G
      C1 --> G
      D1 --> H[Enforce restrictions]
      E1 --> H
      F1 --> H
  end

  style DETECTION fill:#e1f5ff
  style CONTROL fill:#fff3cd
  style GOVERNANCE fill:#d4edda

Mechanism Overview

MechanismDescriptionTechnical FeasibilityGovernance UseRisk Profile
Remote AttestationCryptographically verify hardware state and software configurationHighVerify chips running approved firmwareMedium
Secure EnclavesIsolated execution environments for sensitive operationsHighProtect governance checks from tamperingLow-Medium
Usage MeteringOn-chip tracking of compute operationsMediumMonitor for large training runsMedium
Cryptographic LicensingRequire digital license for operationMediumControl who can use chipsMedium-High
GeolocationTrack physical location of chipsMediumEnforce geographic restrictionsHigh
Remote DisableAbility to shut down chips remotelyMedium-HighEnforcement mechanismVery High
Workload DetectionIdentify specific computation patternsLow-MediumDetect prohibited usesMedium-High

Trusted Platform Module (TPM) Foundation

Many HEM proposals build on existing Trusted Platform Module technology:

FeatureCurrent TPMEnhanced for AI Governance
Secure bootVerify startup softwareVerify AI framework integrity
AttestationReport device stateReport training workload characteristics
Key storageProtect encryption keysStore governance credentials
Sealed storageEncrypt to specific stateBind data to compliance state

TPMs are already deployed in most modern computers. Extending this infrastructure for AI governance is technically feasible but raises scope and purpose questions.

RAND Research Framework

RAND Corporation's 2024 working paper, authored by Gabriel Kulp, Daniel Gonzales, Everett Smith, Lennart Heim, Prateek Puri, Michael J. D. Vermeer, and Zev Winkelman, provides the most comprehensive public analysis of HEMs for AI governance. The research specifically focuses on Export Control Classification Numbers 3A090 and 4A090 (advanced AI chips).

Two Main HEM Approaches Proposed

ApproachMechanismUse CaseRAND Assessment
Offline LicensingRenewable licenses limit processing per chip; requires authorization from chipmaker or governmentPrevent unauthorized users from utilizing illicitly obtained chipsMost feasible; builds on existing TPM infrastructure
Fixed SetRestricts networking capabilities to prevent aggregation of computing powerPrevent large-scale unauthorized training clustersTechnically challenging; requires chip redesign

Proposed Mechanisms Detail

MechanismRAND AssessmentImplementation PathTimeline Estimate
Attestation-based licensingMost feasibleBuild on existing TPM infrastructure2-3 years
Compute trackingTechnically challengingWould require chip redesign3-5 years
Geographic restrictionsModerate feasibilityDelay-based verification (not GPS)6 months for firmware; 2+ years for deployment
Remote disableTechnically feasibleRequires fail-safe design3-5 years

Design Principles (RAND)

  1. Proportionality: Governance mechanisms should match risk levels
  2. Minimal intrusiveness: Collect only necessary information
  3. Fail-safe design: Errors should default to safe states
  4. International coordination: Effective only with broad adoption
  5. Abuse prevention: Strong safeguards against misuse

Limitations Acknowledged

RAND explicitly notes that HEMs would "provide a complement to, but not a substitute for all, export controls." Key limitations include:

  • Cannot prevent all circumvention—improvements in algorithmic efficiency decrease compute required for given capabilities
  • Require ongoing enforcement infrastructure costing $10-200M annually
  • Create attack surfaces for adversaries—must defend against state-level actors
  • May be defeated by determined state actors with sufficient resources
  • New chips must gain significant market share before affecting adversary capabilities (5-10 year cycle)

Location Verification Technology

Location verification has emerged as the most concrete near-term HEM proposal, with active prototyping on Nvidia H100 chips.

How Delay-Based Verification Works

Unlike GPS (which cannot penetrate data center walls and is easily spoofed), delay-based verification uses the physics of signal propagation:

  1. A trusted "landmark server" at a known location sends a cryptographic challenge to the chip
  2. The chip responds with its authenticated identity
  3. By measuring round-trip delay based on the speed of light, servers can verify the chip is within a certain distance
  4. Multiple landmark servers can triangulate approximate location without revealing exact position
PropertySpecification
Location precisionCoarse-grained only (country/region level)
Data revealedDoes not expose what computation is occurring or data being processed
Privacy modelSimilar to consumer devices (iPhones can be remotely located/disabled)
Spoofing resistanceHigher than GPS; requires physical proximity to landmark servers

Implementation Status

MilestoneStatusSource
Proof of concept on H100CompletedAI Frontiers
Nvidia tracking software pilotActiveCNBC
H100 hardware security featuresAlready presentFirmware verification, rollback protection, secure non-volatile memory
Encryption keys for trackingAlready embeddedFuture of Life Institute analysis of Nvidia documentation
BIS policy integrationPartialNVEU authorization conditional on location verification capability

Implementation Requirements

According to IAPS analysis, scaling location verification would require:

  1. Firmware update allowing AI chips to perform rapid location verification (estimated 6 months)
  2. Landmark network of trusted servers near major data centers worldwide
  3. Policy framework defining who operates servers and what actions follow verification failure

Comparison with Alternative Approaches

ApproachPrecisionPrivacySpoofabilityData Center Compatibility
GPSHighLowHigh (easily spoofed)Low (signals blocked)
IP geolocationLowMediumHigh (VPNs)High
Delay-based verificationMediumHighLowHigh
Cell tower triangulationMediumLowMediumVariable

Implementation Considerations

Current Industry Practices

Hardware-enabled mechanisms are already widely used in defense products and commercial contexts:

FeatureCurrent UseAI Governance ExtensionExample Deployment
Device attestationDRM, enterprise securityVerify compute environmentApple iPhone (prevents unauthorized apps)
Remote wipeLost device protectionEnforcement mechanismConsumer smartphones
Licensing serversSoftware activationCompute authorizationWindows, Adobe products
Firmware verificationSecurity patchesPolicy updatesNvidia H100 (already has this)
Hardware attestationChip integrityCompliance monitoringGoogle TPUs (verify chips not compromised)
TPM-based anti-cheatVideo game integrityPrevent compute circumventionMany modern games

Extending these mechanisms for governance involves primarily scope and purpose changes rather than fundamental technical innovation. The Trusted Platform Module (TPM) standard, endorsed by NSA for device attestation, provides a foundation that could be extended for AI governance.

Required Infrastructure

Effective HEM deployment would require:

Diagram (loading…)
flowchart LR
  subgraph CHIP["Chip-Level"]
      A[Hardware Security Module]
      B[Attestation Capability]
      C[Tamper Detection]
  end

  subgraph NETWORK["Network Level"]
      D[Licensing Servers]
      E[Monitoring Infrastructure]
      F[Update Distribution]
  end

  subgraph GOVERNANCE["Governance Level"]
      G[Policy Definition]
      H[Verification Authority]
      I[Enforcement Authority]
  end

  A --> D
  B --> E
  C --> I
  D --> G
  E --> H
  F --> G

  style CHIP fill:#e1f5ff
  style NETWORK fill:#fff3cd
  style GOVERNANCE fill:#d4edda

Cost Estimates

Cost estimates are highly uncertain given the nascent state of HEM development:

ComponentDevelopment CostOngoing CostWho Bears CostNotes
Chip modifications$10-200M$1-20M/year maintenanceManufacturersSimilar to existing security feature development
Landmark server network$10-100M$1-50M/yearGovernments or public-private partnershipDepends on geographic coverage
Verification infrastructure$10-200M$10-50M/yearGovernmentsSoftware, personnel, legal framework
Enforcement systems$10-50M$10-30M/yearGovernmentsInvestigation, penalties, coordination
Compliance systems$1-5M per company$1.5-2M/year per companyOperatorsIntegration with existing IT infrastructure

For comparison, the U.S. and EU have each invested approximately $10 billion through their Chips Acts in semiconductor manufacturing subsidies.

Risk Analysis

Security Risks

The RAND workshop emphasized that HEMs must be "robustly secured against skilled, well-resourced attackers," potentially including state-level adversaries:

RiskDescriptionMitigationSeverity
New attack surfaceGovernance mechanisms can be exploited; critical infrastructure integration increases stakesSecurity-first design; formal verificationHigh
Key managementCompromise of governance keys catastrophicDistributed key management; rotation; HSMsCritical
Insider threatsThose with access could abuse systemsMulti-party controls; auditing; whistleblower protectionsHigh
Nation-state attacksAdvanced adversaries target infrastructureDefense in depth; international redundancy; robust anti-tamper techniquesCritical
Supply chain attacksCompromised chips introduced during manufacturingTrusted foundry programs; hardware verificationHigh

Privacy Risks

Privacy-preserving measures are essential to uphold established data and code privacy norms. If not implemented carefully, HEMs could enable harmful surveillance:

RiskDescriptionMitigationPrivacy-Preserving Alternative
Compute surveillanceDetailed visibility into all computationMinimal logging; privacy-preserving attestationDelay-based verification reveals only coarse location, not computation content
Location trackingContinuous geographic monitoringLimit to high-risk contexts onlyCountry/region level only; no exact coordinates
Workload analysisInfer sensitive research activitiesAggregate reporting; differential privacyVerify workload size without revealing type
IP exposureModel weights or training data could leakHardware isolation; secure enclavesConfidential computing preserves IP while enabling attestation

Critics have drawn comparisons to the Clipper Chip controversy of the 1990s, when the U.S. government proposed mandatory backdoors for encrypted communications. Advocates counter that location verification is fundamentally different—revealing only where chips are, not what they compute.

Abuse Risks

RiskDescriptionMitigation
Authoritarian useRegimes use for oppressionInternational governance; human rights constraints
Competitive weaponizationBlock rival companies/countriesNeutral administration
Mission creepExpand beyond AI safetyClear legal constraints; sunset provisions
CaptureGovernance controlled by incumbentsDiverse oversight; transparency

Strategic Assessment

Arguments For HEMs

ArgumentReasoningConfidence
Unique verification capabilitySoftware-only verification can be circumventedHigh
Enforcement teethExport controls meaningless without enforcementMedium
ScalabilityCan govern millions of chips automaticallyMedium
International coordinationCommon technical standard enables cooperationMedium
Proportional responseDifferent levels for different risksMedium

Arguments Against HEMs

ArgumentReasoningConfidence
Privacy threatCreates unprecedented compute surveillanceHigh
Attack surfaceNew vulnerabilities in critical infrastructureHigh
Authoritarian toolWill be adopted and abused by repressive regimesHigh
CircumventionSufficiently motivated actors will defeatMedium
Chilling effectDiscourages legitimate AI researchMedium
Implementation complexityInternational coordination very difficultMedium-High

Where HEMs Might Be Appropriate

Given the risk/benefit tradeoffs, RAND analysis suggests HEMs may be appropriate for narrow, high-value use cases:

ContextAppropriatenessRationaleCurrent Policy Status
Export control verificationMedium-HighExtends existing policy; addresses $1B+ diversion problemNVEU authorization requires location verification capability
Large training run detectionMediumClear capability threshold (10^26 FLOP under EO 14110)Under consideration
Post-incident investigationMediumLimited, targeted useNo current policy
Ongoing surveillance of all computeLowDisproportionate; massive privacy costWorkshop consensus against broad scope
Inference monitoringVery LowMassive scope, limited benefit; chilling effect on AI deploymentNot under serious consideration

Key insight from RAND: "Although it is premature to definitively endorse the use of HEMs in such high-performance chips as GPUs, dismissing HEM use outright is equally premature."

HEM Governance Ecosystem

The following diagram shows how HEMs fit within the broader AI governance landscape:

Diagram (loading…)
flowchart TD
  subgraph POLICY["Policy Layer"]
      A[Export Controls<br/>3A090/4A090] --> B[Compute Thresholds<br/>10^26 FLOP]
      B --> C[Reporting<br/>Requirements]
  end

  subgraph HEM["Hardware-Enabled Mechanisms"]
      D[Location<br/>Verification] --> E[Delay-Based<br/>Attestation]
      F[Licensing<br/>Controls] --> G[Offline<br/>Renewal]
      H[Usage<br/>Monitoring] --> I[Training Run<br/>Detection]
  end

  subgraph ACTORS["Key Actors"]
      J[BIS/Commerce<br/>Dept]
      K[Chip Makers<br/>Nvidia/AMD]
      L[Data Center<br/>Operators]
  end

  subgraph OUTCOMES["Outcomes"]
      M[Smuggling<br/>Deterrence]
      N[Compliance<br/>Verification]
      O[Enforcement<br/>Actions]
  end

  A --> D
  A --> F
  B --> H
  J --> D
  K --> E
  L --> G
  E --> M
  G --> N
  I --> O

  style POLICY fill:#e1f5ff
  style HEM fill:#fff3cd
  style ACTORS fill:#d4edda
  style OUTCOMES fill:#f8d7da

International Dimensions

Coordination Challenges

ChallengeDescriptionCurrent StatusPotential Resolution
Chip manufacturing concentrationTSMC produces over 90% of advanced chipsCreates leverage but also single point of failureLeverage market power for standards; diversify production
Three-tier country system18 Tier 1 allies with no limits; ~120 Tier 2 with caps; ≈20 Tier 3 prohibitedCreates pressure for circumventionHarmonized international controls
Technology transferHEM tech could be misused by authoritarian regimesNo international agreementCareful capability scoping; human rights conditions
Verification of verifiersWho monitors governance systems?No multilateral frameworkInternational oversight body (IAEA model discussed)
Chinese oppositionChina has warned Nvidia against tracking features and launched security investigationsCreates market pressure on manufacturersMay require accepting reduced China market access

Relationship to Export Controls

HEMs would function alongside export controls:

Control TypeWhat It DoesHEM Complement
Export licensesControl initial transferVerify ongoing location
End-use restrictionsRequire stated purposeVerify actual use
Entity listsBlock specific actorsPrevent circumvention
Compute thresholdsTrigger requirementsDetect threshold crossing

Future Research Needs

Technical Research

QuestionImportanceCurrent StatusKey Researchers/Orgs
Privacy-preserving attestationCriticalActive research; confidential computing integrationCNCF, cloud providers
Tamper-resistant designHighRobust anti-tamper techniques needed for state-level adversariesDefense contractors, chip makers
Minimal-information verificationHighDelay-based verification prototypedIAPS, academic researchers
Formal security analysisHighLimited public analysisAcademic security researchers
Quantum-resistant cryptographyMediumNSA TPM guidance highlights transition needNIST, cryptography community

Policy Research

QuestionImportanceCurrent StatusKey Researchers/Orgs
Appropriate scope limitationsCriticalRAND workshop recommends narrow scopeRAND, GovAI
International governance modelsHighIAEA analogy discussed; no concrete proposalsArms control community
Abuse prevention mechanismsCriticalIdentified as major concern; underexplored solutionsCivil society, human rights orgs
Democratic accountabilityHighUnderexplored; few governance proposalsAI governance researchers
Human rights conditionsHighNot yet integrated into proposalsHuman Rights Watch, Amnesty

Risks Addressed

RiskMechanismEffectiveness
Export control evasionOngoing verificationMedium-High
Unauthorized large trainingCompute detectionMedium
Geographic restrictionsLocation verificationMedium
Incident responseRemote disable capabilityHigh (if implemented)

Key Projects and Legislation

  • FlexHEG - Yoshua Bengio's $4.1M project developing Guarantee Processor and Secure Enclosure architectures for hardware-enabled governance
  • Chip Security Act - Bipartisan U.S. bill requiring location verification mechanisms on advanced AI chips
  • Stop Stealing Our Chips Act - Whistleblower incentive program for AI chip smuggling enforcement
  • CHIPS Alliance / Caliptra - Open-source silicon Root of Trust with cross-vendor support from AMD, Google, Microsoft, NVIDIA
  • Lucid Computing - Startup building hardware-rooted zero-trust verification using TEEs
  • Hardware Mechanisms for International AI Agreements - Detailed analysis of technical mechanisms, threat models, and implementation challenges

Complementary Interventions

  • Export Controls - Initial access controls that HEMs verify
  • Compute Thresholds - Thresholds that HEMs could detect
  • Compute Monitoring - Broader monitoring framework
  • International Regimes - Governance for global coordination

Sources

Primary Research

Policy Developments

Technical Background

News and Analysis


References

This RAND working paper examines hardware-enabled governance mechanisms (HEGMs) as a technical approach to AI oversight, exploring how compute hardware can be leveraged to enforce compliance with AI safety and governance policies at a foundational level. It analyzes how features embedded in AI chips and infrastructure could enable monitoring, access controls, and enforcement of regulatory requirements. The paper contributes to the emerging field of using physical compute infrastructure as a governance lever.

★★★★☆

This RAND report summarizes findings from a 2024 expert workshop exploring hardware-enabled mechanisms (HEMs) in AI chips as tools for enforcing export controls, preventing unauthorized use, and supporting U.S. national security. Participants from AI/chip industries, civil society, and government assessed four HEM options for technical and political feasibility. Key takeaways include that simpler, narrower-scope solutions may be more practical and that HEMs could be valuable as conditions in international sales deals.

★★★★☆
3Federal Register: Framework for AI Diffusionfederalregister.gov·Government

The Bureau of Industry and Security (BIS) establishes a tiered export control framework for advanced AI model weights and computing integrated circuits, dividing countries into three tiers based on trust and national security considerations. The rule aims to prevent adversarial actors from accessing frontier AI capabilities while allowing responsible global AI development among allied nations.

This CNAS report examines hardware-enabled mechanisms (HEMs) as a technological approach to improving AI chip export controls, particularly targeting chip smuggling to China. It analyzes how embedding security and governance functions directly into AI hardware could enable more targeted, enforceable export restrictions while reducing burdens on legitimate trade and preserving democratic values.

★★★★☆

Sidley Austin provides legal analysis of updated Bureau of Industry and Security (BIS) export regulations that expand controls on advanced computing hardware and AI model weights. The regulations significantly broaden international technology transfer restrictions, with major implications for AI developers and exporters. This represents a key development in U.S. policy to limit foreign access to frontier AI capabilities.

Related Wiki Pages

Top Related Pages

Analysis

FlexHEG (Flexible Hardware-Enabled Guarantees)CaliptraShort AI Timeline Policy Implications

Approaches

MAIM (Mutually Assured AI Malfunction)

Policy

Chip Security ActStop Stealing Our Chips Act

Organizations

Lucid ComputingCHIPS AllianceAMDNVIDIABureau of Industry and Security

Concepts

AI Chip Governance Supply ChainCompute GovernanceGovernance-Focused Worldview

Other

Lennart HeimAlan EstevezJake SullivanGabriel Kulp

Key Debates

AI Governance and PolicyAI Risk Critical Uncertainties Model