Hacker News new | past | comments | ask | show | jobs | submit login

This makes sense. But now I’m wondering if people here are speaking from experience or reasoning their way into it. Like are there direct reports of which models people are using for blogspam, or is it just what seems rational?





Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: