Comment by ReptileMan

13 hours ago

>Only the undeployed server code has remained private.

How easy to do you this is for LLM to build decent emulator of the server in question by just observing what you send and what you get as response?

not sure why downvoted. server emulators will become faster to make. protocol analysis will become faster as well.

  • Because while you could get something that drives a dumb interface, by moving the work and data to the server it's not available for the emulation software to use.

    • If the contract is well defined, the LLM can infer what it's purpose is, implementation, possibly even your secret sauce. There is no software moat anymore.

      1 reply →

    • Except that emulating what is seen is surprisingly useful to find attack vectors. As a single deeper datapoint, one can look at more than just baseline behavior and delve into timing details to further refine implementation guesses.