How RAG Systems Leak Your Private Documents — And What You Can Do About It
6d ago · 8 min read · TL;DR Retrieval-Augmented Generation (RAG) systems — used by ChatGPT plugins, Copilot, and enterprise LLMs — leak document identities and content through embedding fingerprints and model inversion attacks. An attacker can reconstruct your proprietary...
Join discussion