Comment by theshrike79
3 hours ago
But how would you exploit them when every one of them is subtly different?
With software that's deployed to millions of computers you have an abundance of targets, but trying to target some random LLM average todo list at scale is hard, isn't it?
No comments yet
Contribute on Hacker News ↗