Unlock the power of LLMs like ChatGPT and Ollama to effortlessly query and analyze your SQL database using natural language. Learn to set up and use LangChain for complex queries, making data-driven decisions easier and accessible to all, even without technical expertise.

  • breadsmasher@lemmy.world
    link
    fedilink
    English
    arrow-up
    20
    arrow-down
    10
    ·
    3 months ago

    Put my entire dataset into an LLM so whoever developed the LLM can steal it and use it for training? No. Thank. You.

    massive security / data protection issue.

    • Scipitie@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      21
      arrow-down
      4
      ·
      3 months ago

      Both langchain as well as ollama run locally and are open source.

      To be very frank: your post sounds like fear mongering without having even clicked on the link.

      • breadsmasher@lemmy.world
        link
        fedilink
        English
        arrow-up
        6
        arrow-down
        8
        ·
        3 months ago

        I did read the article. Do you arbitrarily trust any code you run locally without reviewing it?

        • tal
          link
          fedilink
          English
          arrow-up
          15
          arrow-down
          1
          ·
          edit-2
          3 months ago

          I have reviewed the tiniest fraction of code that I have ever used.

          $  dpkg -l|wc -l
          4526
          $
          

          That’s about 4500 software packages I have installed on one Linux system, to say nothing of other computing devices I’ve used or the other packaging systems in use on this system alone. I have probably looked at any portion of…I don’t know, maybe 20 of those? And that’s to work on a small portion of any one’s codebase, certainly not to audit the software package.

          Nobody using any kind of a remotely normal and modern computing environment, even if they are a software developer and know at least one programming language used by some of the software on their system and if they have the relevant domain knowledge to assess security concerns, has the realistic ability to conduct a review of the code that runs on their system, even in environments, like Linux, where the code is available.

          It’s like asking a mechanical engineer to validate the design correctness of every mechanical device they’ve ever used prior to using it.