Research analyst at Georgetown's CSET think tank
Nefarious actors can use open models maliciously, [...] whereas developers of closed models have more means to identify and disrupt this malicious use. Unverified source (2024)
Comment X 1mo ago
Polls
replying to Kyle Miller
Terms · Privacy · Contact