As I said - they are doing it. Not maybe, they are.
Can't stop terrorists or bot networks using a Chinese open source model.
Can't stop terrorists or bot networks using a Chinese open source model.
Comments
The real questions become about crawling approach, stage of synthetic data use, plus dedup, filtering and other preprocessing steps.