2 Comments
User's avatar
Nauman Noor's avatar

The attack is provactive in terms of what is needed when it comes to securing deployed models though the details seem that the user in this case is far from typical sophisticated players in this area.

Expand full comment
Josh Devon's avatar

Well-said Nauman! The sophistication wasn’t novel in exploits but in orchestration of the attacks. Soft guardrails can’t detect orchestration like this and why we need deterministic controls going forward.

Expand full comment