• kbal
    link
    fedilink
    43
    edit-2
    5 months ago

    If models are trained on data that it would be a security breach for them to reveal to their users, then the real breach occurred at training.