120
you are viewing a single comment's thread
view the rest of the comments
[-] kbal@fedia.io 44 points 5 months ago* (last edited 5 months ago)

If models are trained on data that it would be a security breach for them to reveal to their users, then the real breach occurred at training.

[-] dgerard@awful.systems 26 points 5 months ago

now you know that and i know that,

[-] Cube6392@beehaw.org 17 points 5 months ago

The big LLMs everyone's talking about and using are just advanced forms of theft

this post was submitted on 12 Jul 2024
120 points (100.0% liked)

TechTakes

1485 readers
129 users here now

Big brain tech dude got yet another clueless take over at HackerNews etc? Here's the place to vent. Orange site, VC foolishness, all welcome.

This is not debate club. Unless it’s amusing debate.

For actually-good tech, you want our NotAwfulTech community

founded 1 year ago
MODERATORS