logoalt Hacker News

conradkaytoday at 4:06 AM0 repliesview on HN

You'll have access to the same models as your hypothetical attackers, and a big advantage if only you have access to the source code