• kbal
    link
    fedilink
    44
    edit-2
    2 months ago

    If models are trained on data that it would be a security breach for them to reveal to their users, then the real breach occurred at training.

    • David GerardOPMA
      link
      English
      282 months ago

      now you know that and i know that,

    • The Cuuuuube
      link
      fedilink
      English
      192 months ago

      The big LLMs everyone’s talking about and using are just advanced forms of theft