Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
login
sandermvanvliet
1 day ago
|
parent
|
context
|
favorite
| on:
Document poisoning in RAG systems: How attackers c...
If you think about this in the context of systems that ingest content from third party systems then this attack becomes more feasible.
But then, if you’re inside the network you’ve already overcome many of the boundaries
help
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search:
But then, if you’re inside the network you’ve already overcome many of the boundaries