← Back to context Comment by satvikpendem 9 hours ago Not necessarily, you can ask the LLM to reverse engineer the protocol. 0 comments satvikpendem Reply No comments yet Contribute on Hacker News ↗
No comments yet
Contribute on Hacker News ↗