• kbal@fedia.io
    link
    fedilink
    arrow-up
    43
    ·
    edit-2
    5 months ago

    If models are trained on data that it would be a security breach for them to reveal to their users, then the real breach occurred at training.