Then the defensive technologies will not be distributed. We will rely on those two or three model makers to implement, say, watermarks. The sentences they generate, the pictures they generate will have those invisible watermarks that they can tell.
j previous speech k next speech