Audrey Tang

Consequently, if a user asks DeepSeek R1 to generate harmful or malicious content—for example, personal attacks, disinformation scripts, or scam plots—the model doesn’t inherently refuse. It tries to comply with user requests.

鍵盤快捷鍵Keyboard shortcuts

j 下一段next speechk 上一段previous speech