Hacker News new | past | comments | ask | show | jobs | submit login

One approach might be to redact sensitive parts of the input, replacing private data with tokens. Then substitute the tokens back again in the output.

But this only works if the sensitive data isn't needed for inference and you have a reliable way of detecting it.




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: