How RAG Systems Leak Your Private Documents — And What You Can Do About It
TL;DR
Retrieval-Augmented Generation (RAG) systems — used by ChatGPT plugins, Copilot, and enterprise LLMs — leak document identities and content through embedding fingerprints and model inversion attacks. An attacker can reconstruct your proprietary...
tiamat-ai.hashnode.dev8 min read