<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: HRIDA AI</title>
    <description>The latest articles on DEV Community by HRIDA AI (@hrida_ai).</description>
    <link>https://dev.to/hrida_ai</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1852399%2Fea22a749-56bb-4e81-8389-920a3cc87201.png</url>
      <title>DEV Community: HRIDA AI</title>
      <link>https://dev.to/hrida_ai</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/hrida_ai"/>
    <language>en</language>
    <item>
      <title>DeepSeek's Data Breach: A Wake-Up Call for AI Data Security</title>
      <dc:creator>HRIDA AI</dc:creator>
      <pubDate>Fri, 31 Jan 2025 12:30:22 +0000</pubDate>
      <link>https://dev.to/hrida_ai/deepseeks-data-breach-a-wake-up-call-for-ai-data-security-1e1c</link>
      <guid>https://dev.to/hrida_ai/deepseeks-data-breach-a-wake-up-call-for-ai-data-security-1e1c</guid>
      <description>&lt;h3&gt;
  
  
  Setting the Stage: DeepSeek’s Approach to the R1 Model:
&lt;/h3&gt;

&lt;p&gt;DeepSeek, led by Liang Wenfeng, emerged from a hedge fund leveraging AI for financial markets. Based in Hangzhou, the same tech hub as Alibaba, DeepSeek innovates by reducing data processing needs in model training—combining its own breakthroughs with techniques used by resource-constrained Chinese AI firms. As AI researcher Lennart Heim explains, traditional models like early ChatGPT versions function like librarians who meticulously read entire libraries before answering questions—an energy-intensive and costly process. DeepSeek’s approach streamlines this, optimizing efficiency without compromising intelligence.&lt;/p&gt;

&lt;p&gt;DeepSeek took another approach. Its librarian hasn’t read all the books but is trained to hunt out the right book for the answer after it is asked a question. Layered on top of that is another technique, called “mixture of experts.” Rather than trying to find a librarian who can master questions on any topic, DeepSeek and some other AI developers do something akin to delegating questions to a roster of experts in specific fields, such as fiction, periodicals and cooking. Each expert needs less training, easing the demand on chips to do everything at once. DeepSeek’s approach requires less time and power before the question is asked, but uses more time and power while answering. All things considered, Heim said, DeepSeek’s shortcuts help it train AI at a fraction of the cost of competing models.&lt;/p&gt;

&lt;h3&gt;
  
  
  The DeepSeek Incident: A Wake-Up Call:
&lt;/h3&gt;

&lt;p&gt;As DeepSeek gained traction in the AI industry, the Wiz a cloud security solution company founded in 2020, conducted an external security assessment to evaluate its vulnerabilities. Almost immediately, they discovered a publicly accessible ClickHouse database directly linked to DeepSeek, left completely open without authentication. This database, hosted at &lt;code&gt;oauth2callback.deepseek.com:9000&lt;/code&gt; and &lt;code&gt;dev.deepseek.com:9000&lt;/code&gt;, contained a substantial amount of sensitive data, including chat logs, backend records, log streams, API secrets, and critical operational details. Even more concerning was the fact that the database’s exposure not only compromised confidential information but also granted full control over its contents. With no authentication or security measures in place, this vulnerability created a risk of privilege escalation within DeepSeek’s infrastructure, leaving its entire environment defenseless against potential threats.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fwww.hridaai.com%2F_next%2Fimage%3Furl%3D%252Fimages%252Fdeepseek%252FAfFCc8CZraQ_QTFU51J10xbVxtRUPxlibQXmbVvqz9k%253D.png%26w%3D1920%26q%3D40" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fwww.hridaai.com%2F_next%2Fimage%3Furl%3D%252Fimages%252Fdeepseek%252FAfFCc8CZraQ_QTFU51J10xbVxtRUPxlibQXmbVvqz9k%253D.png%26w%3D1920%26q%3D40" alt="Wiz Log images" width="800" height="446"&gt;&lt;/a&gt;&lt;/p&gt;

Credits: Wiz Research




&lt;h3&gt;
  
  
  How Did the Wiz Team Uncover This Security Glitch?
&lt;/h3&gt;

&lt;p&gt;In cybersecurity, &lt;a href="https://www.esecurityplanet.com/threats/how-hackers-use-reconnaissance/#:~:text=Network%20mapping%20is%20a%20useful,to%20slip%20past%20a%20firewall." rel="noopener noreferrer"&gt;reconnaissance&lt;/a&gt; technique refers to the process of gathering information about a target system or network. It is often employed by attackers to identify potential vulnerabilities and access points before launching a cyberattack. Common reconnaissance techniques include footprinting, port scanning, network mapping, OS fingerprinting, DNS record lookups, social engineering, and vulnerability scanning. These techniques can be categorized as either passive (observing publicly available information) or active (interacting with the target system to gather data). Using this technique, the Wiz research team discovered the vulnerabilities.&lt;/p&gt;

&lt;p&gt;According to findings reported by the Wiz Research team, an assessment of DeepSeek’s publicly accessible domains revealed significant security risks. Using a combination of passive and active reconnaissance techniques to map the external attack surface, researchers identified approximately 30 internet-facing subdomains. Most of these appeared harmless, hosting components like the chatbot interface, status page, and API documentation, with no immediate signs of critical exposure.&lt;/p&gt;

&lt;p&gt;However, upon expanding their search beyond standard HTTP ports (80/443), the team detected two unusual open ports—8123 and 9000—on multiple hosts, including:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://oauth2callback.deepseek.com:8123" rel="noopener noreferrer"&gt;http://oauth2callback.deepseek.com:8123&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://dev.deepseek.com:8123" rel="noopener noreferrer"&gt;http://dev.deepseek.com:8123&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://oauth2callback.deepseek.com:9000" rel="noopener noreferrer"&gt;http://oauth2callback.deepseek.com:9000&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://dev.deepseek.com:9000" rel="noopener noreferrer"&gt;http://dev.deepseek.com:9000&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Further investigation revealed that these ports provided direct access to a publicly exposed &lt;a href="https://clickhouse.com/" rel="noopener noreferrer"&gt;ClickHouse database&lt;/a&gt;—entirely unprotected and requiring no authentication. This discovery raised immediate security concerns, as ClickHouse is an open-source, columnar database management system designed for high-speed analytical queries on massive datasets. Originally developed by Yandex, ClickHouse is widely used for real-time data processing, log storage, and big data analytics—making such an exposure particularly sensitive and valuable from a security standpoint.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fwww.hridaai.com%2F_next%2Fimage%3Furl%3D%252Fimages%252Fdeepseek%252FpYp8lAqXJ-BSG2bHg6q2l5g7AS6F4BOGKHUpw_GnhgQ%253D.png%26w%3D1920%26q%3D40" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fwww.hridaai.com%2F_next%2Fimage%3Furl%3D%252Fimages%252Fdeepseek%252FpYp8lAqXJ-BSG2bHg6q2l5g7AS6F4BOGKHUpw_GnhgQ%253D.png%26w%3D1920%26q%3D40" alt="DB Response" width="800" height="449"&gt;&lt;/a&gt;&lt;/p&gt;

Database information schema response from the exposed ClickHouse instance. **Credits: Wiz Research**




&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fwww.hridaai.com%2F_next%2Fimage%3Furl%3D%252Fimages%252Fdeepseek%252F91I3cxfIqcCuk_y6Rup6QmAZhYKKSZpck5GRaZPOVSI%253D.png%26w%3D1920%26q%3D40" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fwww.hridaai.com%2F_next%2Fimage%3Furl%3D%252Fimages%252Fdeepseek%252F91I3cxfIqcCuk_y6Rup6QmAZhYKKSZpck5GRaZPOVSI%253D.png%26w%3D1920%26q%3D40" alt="List of tables" width="800" height="554"&gt;&lt;/a&gt;&lt;/p&gt;

List of tables from the exposed ClickHouse instance. **Credits: Wiz Research**




&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fwww.hridaai.com%2F_next%2Fimage%3Furl%3D%252Fimages%252Fdeepseek%252FrLM3fPkjHFQM-T_63XX9HXIftth9ZPg4bFVcEwh8RPw%253D.png%26w%3D1920%26q%3D40" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fwww.hridaai.com%2F_next%2Fimage%3Furl%3D%252Fimages%252Fdeepseek%252FrLM3fPkjHFQM-T_63XX9HXIftth9ZPg4bFVcEwh8RPw%253D.png%26w%3D1920%26q%3D40" width="800" height="448"&gt;&lt;/a&gt;&lt;/p&gt;

API Keys, Chat Logs, and Backend Records from the exposed ClickHouse instance. **Credits: Wiz Research**




&lt;h3&gt;
  
  
  Lesson Takeway from Deepseek Security breach:
&lt;/h3&gt;

&lt;p&gt;As AI services are widely adopted across various sectors of the economy, the adoption of these technologies without corresponding security measures is inherently risky. While much of the attention around AI security focuses on futuristic threats, the real dangers often arise from basic risks—such as the accidental external exposure of databases. These fundamental security risks should remain a top priority for security teams.&lt;/p&gt;

&lt;p&gt;As organizations rush to adopt AI tools and services from a growing number of startups and providers, it’s essential to remember that we’re entrusting these companies with sensitive data. The rapid pace of adoption can often lead to overlooking security, but protecting customer data must remain the top priority. It’s crucial that security teams work closely with AI engineers to ensure visibility into the architecture, tooling, and models being used, so we can safeguard data and prevent exposure. Failing to do so could result in a severe backlash, damaging client trust and severely impacting the business.&lt;/p&gt;

&lt;h3&gt;
  
  
  Mitigating the Risks of AI Data Exposure:
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fwww.hridaai.com%2F_next%2Fimage%3Furl%3D%252Fimages%252Fdeepseek%252FQXuzUP7QlwU_WELLqSgUoMYQImUuh9zds8tgSjT8QQY%253D.png%26w%3D1920%26q%3D40" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fwww.hridaai.com%2F_next%2Fimage%3Furl%3D%252Fimages%252Fdeepseek%252FQXuzUP7QlwU_WELLqSgUoMYQImUuh9zds8tgSjT8QQY%253D.png%26w%3D1920%26q%3D40" alt="Risk in AI Pipelines" width="800" height="392"&gt;&lt;/a&gt;&lt;/p&gt;

Security risks associated with AI data exposure. **Credits: Wiz Research**




&lt;p&gt;Given the security risks outlined above, &lt;strong&gt;Spro&lt;/strong&gt; from &lt;a href="https://www.hridaai.com/" rel="noopener noreferrer"&gt;HridaAI&lt;/a&gt; stands out as a crucial solution for businesses aiming to leverage GenAI while protecting sensitive data. &lt;a href="https://www.hridaai.com/spro" rel="noopener noreferrer"&gt;Spro&lt;/a&gt; is a secure, AI-driven platform built to ensure data privacy and compliance, allowing businesses to integrate GenAI capabilities effortlessly without sacrificing user trust or regulatory adherence.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Key Features of Spro:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Data Privacy and Compliance: &lt;/strong&gt;Spro prioritises the protection of sensitive data, ensuring that all interactions with GenAI models adhere to stringent privacy standards and regulatory requirements.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Secure Integration:&lt;/strong&gt;The platform offers a secure and scalable solution that integrates seamlessly with existing business operations, eliminating the need for expensive in-house AI infrastructure.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Dual Protection Approach:&lt;/strong&gt;Spro safeguards both AI model creators and users by providing robust security measures against potential threats, protecting intellectual property and sensitive user data.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fwww.hridaai.com%2F_next%2Fimage%3Furl%3D%252Fimages%252Fdeepseek%252FO8XmJutxBfM5cfEwxbHS9EclzIaLRxFUkgXailhmYJg%253D.png%26w%3D1920%26q%3D40" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fwww.hridaai.com%2F_next%2Fimage%3Furl%3D%252Fimages%252Fdeepseek%252FO8XmJutxBfM5cfEwxbHS9EclzIaLRxFUkgXailhmYJg%253D.png%26w%3D1920%26q%3D40" alt="Spro Working" width="800" height="208"&gt;&lt;/a&gt;&lt;/p&gt;

Spro: Masking and Securing Data Before Sending it to the AI Model.




&lt;p&gt;When using AI tools and services from startups and providers, exposing &lt;u&gt;Personal Identifiable Information (PII), API keys, or source code&lt;/u&gt; comes with significant risks. There is often no guarantee or way to fact-check the security measures these platforms have in place to protect sensitive data— as seen in the case of DeepSeek. A critical safeguard against such vulnerabilities is implementing data masking before transmitting information to external service providers. By ensuring that sensitive data is removed or masked at the source, organisations can mitigate the risks of unintended exposure due to security gaps or negligence on the part of third-party providers. This &lt;a href="https://www.informatica.com/blogs/data-redaction-what-it-is-and-when-to-use-it.html" rel="noopener noreferrer"&gt;data redaction&lt;/a&gt; approach strengthens data security and ensures compliance with best practices in handling confidential information.&lt;/p&gt;

&lt;p&gt;To quickly test this, you can either use the &lt;a href="https://www.hridaai.com/spro/preview" rel="noopener noreferrer"&gt;playground&lt;/a&gt; or the provided code snippet. Additionally, you can get your free &lt;a href="https://www.hridaai.com/spro/api-keys" rel="noopener noreferrer"&gt;API Key&lt;/a&gt; and access the &lt;a href="https://www.hridaai.com/spro/docs" rel="noopener noreferrer"&gt;documentation&lt;/a&gt; for more details about Spro.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight python"&gt;&lt;code&gt;&lt;span class="kn"&gt;import&lt;/span&gt; &lt;span class="n"&gt;os&lt;/span&gt;
&lt;span class="kn"&gt;from&lt;/span&gt; &lt;span class="n"&gt;openai&lt;/span&gt; &lt;span class="kn"&gt;import&lt;/span&gt; &lt;span class="n"&gt;OpenAI&lt;/span&gt;
&lt;span class="kn"&gt;from&lt;/span&gt; &lt;span class="n"&gt;spro&lt;/span&gt; &lt;span class="kn"&gt;import&lt;/span&gt; &lt;span class="n"&gt;Spro&lt;/span&gt;  &lt;span class="c1"&gt;# Import the Spro library
&lt;/span&gt;
&lt;span class="c1"&gt;# Initialize Spro client with API key
&lt;/span&gt;&lt;span class="n"&gt;spro_client&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="nc"&gt;Spro&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;api_key&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="n"&gt;os&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;getenv&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;SPRO_API_KEY&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;))&lt;/span&gt;

&lt;span class="c1"&gt;# Initialize OpenAI client with your DeepSeek API key
&lt;/span&gt;&lt;span class="n"&gt;openai_client&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="nc"&gt;OpenAI&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;api_key&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;&amp;lt;DeepSeek API Key&amp;gt;&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="n"&gt;base_url&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;https://api.deepseek.com&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;

&lt;span class="c1"&gt;# Text to be secured
&lt;/span&gt;&lt;span class="n"&gt;prompt&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;Hello, I have a sensitive email at example@example.com.&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;

&lt;span class="c1"&gt;# Use Spro to secure the text (redact sensitive information)
&lt;/span&gt;&lt;span class="n"&gt;secured_text&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;spro_client&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;secure&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;prompt&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;

&lt;span class="c1"&gt;# Now send the secured (redacted) text to OpenAI for further processing
&lt;/span&gt;&lt;span class="n"&gt;response&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;openai_client&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="n"&gt;chat&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="n"&gt;completions&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;create&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;
    &lt;span class="n"&gt;model&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;deepseek-chat&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;
    &lt;span class="n"&gt;messages&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="p"&gt;[&lt;/span&gt;
        &lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;role&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt; &lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;system&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;content&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt; &lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;You are a helpful assistant&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;},&lt;/span&gt;
        &lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;role&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt; &lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;user&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;content&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt; &lt;span class="n"&gt;secured_text&lt;/span&gt;&lt;span class="p"&gt;},&lt;/span&gt;  &lt;span class="c1"&gt;# Send the redacted text here
&lt;/span&gt;    &lt;span class="p"&gt;],&lt;/span&gt;
    &lt;span class="n"&gt;stream&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="bp"&gt;False&lt;/span&gt;
&lt;span class="p"&gt;)&lt;/span&gt;

&lt;span class="c1"&gt;# Print OpenAI's response
&lt;/span&gt;&lt;span class="nf"&gt;print&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;response&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="n"&gt;choices&lt;/span&gt;&lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="mi"&gt;0&lt;/span&gt;&lt;span class="p"&gt;].&lt;/span&gt;&lt;span class="n"&gt;message&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="n"&gt;content&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Testing Spro in the Playground – No need to sign up or log in to try it out. Users can instantly experience its features. After logging into Spro, you'll receive a free $25 credit to get started. This enables hands-on experimentation, making it easy to explore and integrate Spro as a Firewall for securely enhancing your AI workflows.&lt;/p&gt;

&lt;h3&gt;
  
  
  Conclusion
&lt;/h3&gt;

&lt;p&gt;As AI technologies continue to evolve, businesses must prioritise data privacy and security to maintain user trust and comply with regulations. Spro offers a comprehensive solution that addresses these challenges, providing a secure and compliant pathway for businesses to leverage GenAI capabilities effectively.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Protect your AI data today! Try Spro for free in our  &lt;a href="https://www.hridaai.com/spro/preview" rel="noopener noreferrer"&gt;Playground &lt;/a&gt; and experience secure AI integration!&lt;/em&gt;&lt;/p&gt;

</description>
      <category>deepseek</category>
      <category>ai</category>
      <category>cybersecurity</category>
      <category>security</category>
    </item>
    <item>
      <title>Introducing the Hrida T2SQL 128k Model</title>
      <dc:creator>HRIDA AI</dc:creator>
      <pubDate>Sun, 11 Aug 2024 19:46:26 +0000</pubDate>
      <link>https://dev.to/hrida_ai/introducing-the-hrida-t2sql-128k-model-pbm</link>
      <guid>https://dev.to/hrida_ai/introducing-the-hrida-t2sql-128k-model-pbm</guid>
      <description>&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbio95sjcnz2puypfbjpp.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbio95sjcnz2puypfbjpp.png" alt="Image description" width="800" height="204"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;We’re excited to introduce the Hrida T2SQL 128k model, the latest and most advanced addition to our Text-to-SQL lineup! This model represents a significant upgrade from our previous 4k version, featuring a remarkable 128k context window that brings new levels of precision and efficiency to your SQL queries.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fzt26lapsqeu8byvanpx8.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fzt26lapsqeu8byvanpx8.png" alt="Model Size and Context Length Comparison" width="800" height="496"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  What’s New with Hrida T2SQL 128k?
&lt;/h2&gt;

&lt;p&gt;The Hrida T2SQL 128k model marks a significant advancement over its previous version. It has a much larger context window "128k", which means it can handle large datasets and  complicated queries more easily. This helps the model give you more accurate and detailed answers.&lt;/p&gt;

&lt;p&gt;Furthermore, the enhancements extend beyond this. The Hrida T2SQL 128k model enhances the way you interact with data. Users can now ask queries in a more natural and conversational manner. The model understands and processes these queries better, providing responses that include not just the SQL commands but also explanations on why certain queries are generated. This added layer of clarity helps users understand how their questions are translated into SQL, making the interaction more intuitive and informative.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fzb3mb9myyj33nei798ej.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fzb3mb9myyj33nei798ej.png" alt="Text-to-SQL Context Length Comparison" width="800" height="533"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Why the 128k Context Window Makes a Difference?
&lt;/h2&gt;

&lt;p&gt;The 128k context window is a game-changer in how our model handles data. With this expanded context window, the Hrida T2SQL 128k model can  accomodate a wide range of information simultaneously. As a result, it can manage more complex and detailed queries, producing more precise and valuable SQL responses.&lt;/p&gt;

&lt;p&gt;Additionally, this larger context window improves the model’s ability to maintain continuity in conversations. For users engaging in multi-turn interactions, the model can keep track of previous queries and responses, ensuring a coherent and contextually relevant exchange. This leads to a more seamless experience, where complex data queries are managed effectively without losing the thread of the conversation.&lt;/p&gt;

&lt;h2&gt;
  
  
  Breaking the Limits: Performance That Delivers
&lt;/h2&gt;

&lt;p&gt;Despite being a 3 billion parameter model, the Hrida T2SQL 128k achieves outstanding performance.It strikes a balance between size and efficiency, often surpassing larger models in terms of both speed and accuracy. Our internal benchmarks show that the Hrida T2SQL 128k model excels in handling complex queries and large datasets, offering high-quality results without the heavy computational demands of some larger models.&lt;/p&gt;

&lt;p&gt;This model’s Phi 3 architecture plays a crucial role in its performance. By optimizing query generation and execution, the Hrida T2SQL 128k ensures that users receive precise answers quickly. Whether you’re dealing with extensive data or intricate queries, this model provides a reliable and efficient solution.&lt;/p&gt;

&lt;h2&gt;
  
  
  Try the Hrida T2SQL 128k Model in Action!
&lt;/h2&gt;

&lt;p&gt;Ready to enhance your business’s text-to-SQL capabilities? .Enjoy Outstanding accuracy and efficiency for handling complex queries and large datasets while minimizing computational load. Transform your data management with ease using the Hrida T2SQL 128k model. Seamlessly integrate this high-performance model into your systems and elevate your data handling with unmatched efficiency and drive your business to new standards.&lt;/p&gt;

&lt;p&gt;Explore our models on Hugging Face and reach out to us to discover how our superior solutions can elevate your business. Contact us today to get started. Stay tuned for more updates from HridaAI!&lt;/p&gt;

&lt;p&gt;&lt;a href="https://huggingface.co/HridaAI/Hrida-T2SQL-3B-128k-V0.1" rel="noopener noreferrer"&gt;Hugging Face&lt;/a&gt; | &lt;a href="//mailto:hrida.aiofficial@gmail.com"&gt;Contact Us&lt;/a&gt;&lt;/p&gt;

</description>
      <category>ai</category>
      <category>llm</category>
      <category>opensource</category>
      <category>sql</category>
    </item>
  </channel>
</rss>
