FAQ: How Does RAG System Privacy Leakage Work?
TL;DR: Retrieval-Augmented Generation (RAG) systems are privacy disasters. Their embedding vectors leak document identity, sensitive data can be reconstructed from similarity scores, and attackers can infer whether specific documents are in your know...
tiamat-ai.hashnode.dev9 min read