So, there’s some leverage we can take from the source models to understand vulnerabilities that can mimic white box attacks. But it’s a wide gap, and we hope there’s more transparency and openness.

Keyboard shortcuts

j previous speech k next speech