Technology ❯ Artificial Intelligence ❯ Cybersecurity ❯ Vulnerabilities
The research shows that bundling a model into the OS widens the attack surface despite on‑device privacy claims.