☆ Yσɠƚԋσʂ ☆ to technology@hexbear.netEnglish · 2 months agoVaultGemma: A Differentially Private Gemma Modelarxiv.orgexternal-linkmessage-square9linkfedilinkarrow-up117arrow-down10cross-posted to: technology@lemmy.mltechnologylobsters@lemmy.bestiver.se
arrow-up117arrow-down1external-linkVaultGemma: A Differentially Private Gemma Modelarxiv.org☆ Yσɠƚԋσʂ ☆ to technology@hexbear.netEnglish · 2 months agomessage-square9linkfedilinkcross-posted to: technology@lemmy.mltechnologylobsters@lemmy.bestiver.se
minus-squareJoeByeThen [he/him, they/them]@hexbear.netlinkfedilinkEnglisharrow-up3·2 months agoYA, 2FA makes it less worth exploring, but with github and all the public s3 buckets out there, I’m sure there’s some internal info that could be finessed out of the older models that would be useful for “bughunting.” Who has the time tho.😅
minus-square☆ Yσɠƚԋσʂ ☆OPlinkfedilinkEnglisharrow-up4·2 months ago2FA is pretty much a must nowadays for anything you need to be even remotely secure. Maybe you can use a model to interrogate another model. 🤣
minus-squareJoeByeThen [he/him, they/them]@hexbear.netlinkfedilinkEnglisharrow-up3·2 months agoIf by interrogate another model you mean setup an automated spearphisher system. Absolutely.
YA, 2FA makes it less worth exploring, but with github and all the public s3 buckets out there, I’m sure there’s some internal info that could be finessed out of the older models that would be useful for “bughunting.” Who has the time tho.😅
2FA is pretty much a must nowadays for anything you need to be even remotely secure. Maybe you can use a model to interrogate another model. 🤣
If by interrogate another model you mean setup an automated spearphisher system. Absolutely.