←back to thread

534 points BlueFalconHD | 1 comments | | HN request time: 0.207s | source

I managed to reverse engineer the encryption (refered to as “Obfuscation” in the framework) responsible for managing the safety filters of Apple Intelligence models. I have extracted them into a repository. I encourage you to take a look around.
Show context
mike_hearn ◴[] No.44483836[source]
Are you sure it's fully deobfuscated? What's up with reject phrases like "Granular mango serpent"?
replies(9): >>44483870 #>>44483918 #>>44483982 #>>44484014 #>>44484047 #>>44484460 #>>44484489 #>>44486400 #>>44488390 #
1. BlueFalconHD ◴[] No.44484460[source]
These are the contents read by the Obfuscation functions exactly. There seems to be a lot of testing stuff still though, remember these models are relatively recent. There is a true safety model being applied after these checks as well, this is just to catch things before needing to load the safety model.