So, there’s some leverage we can take from the source models to understand vulnerabilities that can mimic white box attacks. But it’s a wide gap, and we hope there’s more transparency and openness.
j previous speech k next speech