• kbal@fedia.io
    link
    fedilink
    arrow-up
    41
    ·
    edit-2
    4 months ago

    If models are trained on data that it would be a security breach for them to reveal to their users, then the real breach occurred at training.