logoalt Hacker News

Izkatatoday at 12:40 AM2 repliesview on HN

Because while you could get something that drives a dumb interface, by moving the work and data to the server it's not available for the emulation software to use.


Replies

reactordevtoday at 3:59 AM

If the contract is well defined, the LLM can infer what it's purpose is, implementation, possibly even your secret sauce. There is no software moat anymore.

show 1 reply
imoverclockedtoday at 3:50 AM

Except that emulating what is seen is surprisingly useful to find attack vectors. As a single deeper datapoint, one can look at more than just baseline behavior and delve into timing details to further refine implementation guesses.