124
you are viewing a single comment's thread
view the rest of the comments
[-] kbal@fedia.io 44 points 4 months ago* (last edited 4 months ago)

If models are trained on data that it would be a security breach for them to reveal to their users, then the real breach occurred at training.

[-] dgerard@awful.systems 28 points 4 months ago

now you know that and i know that,

[-] Cube6392@beehaw.org 19 points 4 months ago

The big LLMs everyone's talking about and using are just advanced forms of theft

this post was submitted on 12 Jul 2024
124 points (99.2% liked)

TechTakes

1441 readers
76 users here now

Big brain tech dude got yet another clueless take over at HackerNews etc? Here's the place to vent. Orange site, VC foolishness, all welcome.

This is not debate club. Unless it’s amusing debate.

For actually-good tech, you want our NotAwfulTech community

founded 1 year ago
MODERATORS