

2·
3 days agoYeah, one of those is factually correct and got upvoted…
Yeah, one of those is factually correct and got upvoted…
I was reading someone else’s explanation and they said it’s the equivalent of every computer possibly having a backdoor because there is code in a computer that a bad actor can use. There are extra commands that could possibly be used for a backdoor if a malicious actor found a way to use those bits of code. It’s much less oh here is a security vulnerability that is being used and more of a if a robber breaks into our house which is possible they will rob us situation.
Llm’s are ML…or did I miss something here?
Cry harder?