schwim , 1 month ago (edited 1 month ago) Anyone have an eli5 explanation of how AITA works? What patterns could be captured and how would that lead to identification or data siphoning?
Anyone have an eli5 explanation of how AITA works? What patterns could be captured and how would that lead to identification or data siphoning?