• sunzu2@thebrainbin.org
    link
    fedilink
    arrow-up
    1
    ·
    17 hours ago

    if you have LLM with full permissions on your end point, then end to end encryption is useless whoever controls your LLM.