But I think with many of the cryptographic protocols, as long as you stay in the domain, it’s fine. But in the end, you want to train a model, you want to do inference. So, the inference result ends up somewhere, I guess. That’s the question. If this is also protected. I’m not quite sure where that is…

Keyboard shortcuts

j previous speech k next speech