Comment by Kyle Miller

Research analyst at Georgetown's CSET think tank
Nefarious actors can use open models maliciously, [...] whereas developers of closed models have more means to identify and disrupt this malicious use. Unverified source (2024)
Like Share on X 4mo ago
Policy proposals and claims
replying to Kyle Miller