• sunzu2@thebrainbin.org
    link
    fedilink
    arrow-up
    2
    ·
    12 days ago

    if you have LLM with full permissions on your end point, then end to end encryption is useless whoever controls your LLM.