124
you are viewing a single comment's thread
view the rest of the comments
[-] kbal@fedia.io 44 points 1 month ago* (last edited 1 month ago)

If models are trained on data that it would be a security breach for them to reveal to their users, then the real breach occurred at training.

[-] Cube6392@beehaw.org 19 points 1 month ago

The big LLMs everyone's talking about and using are just advanced forms of theft

load more comments (1 replies)
this post was submitted on 12 Jul 2024
124 points (99.2% liked)

TechTakes

1198 readers
148 users here now

Big brain tech dude got yet another clueless take over at HackerNews etc? Here's the place to vent. Orange site, VC foolishness, all welcome.

For actually-good tech, you want our NotAwfulTech community

founded 1 year ago
MODERATORS