Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I wonder if this is more a PR/legal strategy on their part than anything else. If you do decide to download the model and generate fake tweets with it, how are they going to prove you used it? And even if they could, what sort of action can they enforce to stop you from doing so?


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: