Javascript is not enabled. This site can still works but it'll be more interactive when javascript is enabled.
loading...
Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
sandermvanvliet
2 hours ago
|
on: Document poisoning in RAG systems: How attackers corrupt AI's sources
If you think about this in the context of systems that ingest content from third party systems then this attack becomes more feasible.
But then, if you’re inside the network you’ve already overcome many of the boundaries
reply