You are viewing a single thread.
View all comments
43 points
*

If models are trained on data that it would be a security breach for them to reveal to their users, then the real breach occurred at training.

permalink
report
reply
28 points

now you know that and i know that,

permalink
report
parent
reply
19 points

The big LLMs everyone’s talking about and using are just advanced forms of theft

permalink
report
parent
reply

TechTakes

!techtakes@awful.systems

Create post

Big brain tech dude got yet another clueless take over at HackerNews etc? Here’s the place to vent. Orange site, VC foolishness, all welcome.

This is not debate club. Unless it’s amusing debate.

For actually-good tech, you want our NotAwfulTech community

Community stats

  • 1.7K

    Monthly active users

  • 549

    Posts

  • 12K

    Comments

Community moderators