schwim , (edited )
@schwim@lemm.ee avatar

Anyone have an eli5 explanation of how AITA works? What patterns could be captured and how would that lead to identification or data siphoning?

  • All
  • Subscribed
  • Moderated
  • Favorites
  • [email protected]
  • kbinchat
  • All magazines