In this context, we're talking about models that can be used by bad actors to run on their own hardware. The openness of them is not particularly relevant to bad actors using them.

Comments