<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://hackerpedia.org/index.php?action=history&amp;feed=atom&amp;title=Dual-use_foundation_model</id>
	<title>Dual-use foundation model - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://hackerpedia.org/index.php?action=history&amp;feed=atom&amp;title=Dual-use_foundation_model"/>
	<link rel="alternate" type="text/html" href="https://hackerpedia.org/index.php?title=Dual-use_foundation_model&amp;action=history"/>
	<updated>2026-04-26T09:55:20Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.45.1</generator>
	<entry>
		<id>https://hackerpedia.org/index.php?title=Dual-use_foundation_model&amp;diff=26849&amp;oldid=prev</id>
		<title>imported&gt;Unknown user at 00:24, 20 January 2026</title>
		<link rel="alternate" type="text/html" href="https://hackerpedia.org/index.php?title=Dual-use_foundation_model&amp;diff=26849&amp;oldid=prev"/>
		<updated>2026-01-20T00:24:28Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 00:24, 20 January 2026&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;4&quot; class=&quot;diff-notice&quot; lang=&quot;en&quot;&gt;&lt;div class=&quot;mw-diff-empty&quot;&gt;(No difference)&lt;/div&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;!-- diff cache key wiki:diff:1.41:old-16941:rev-26849 --&gt;
&lt;/table&gt;</summary>
		<author><name>imported&gt;Unknown user</name></author>
	</entry>
	<entry>
		<id>https://hackerpedia.org/index.php?title=Dual-use_foundation_model&amp;diff=16941&amp;oldid=prev</id>
		<title>imported&gt;Unknown user at 02:53, 15 January 2026</title>
		<link rel="alternate" type="text/html" href="https://hackerpedia.org/index.php?title=Dual-use_foundation_model&amp;diff=16941&amp;oldid=prev"/>
		<updated>2026-01-15T02:53:33Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 02:53, 15 January 2026&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;4&quot; class=&quot;diff-notice&quot; lang=&quot;en&quot;&gt;&lt;div class=&quot;mw-diff-empty&quot;&gt;(No difference)&lt;/div&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;!-- diff cache key wiki:diff:1.41:old-7143:rev-16941 --&gt;
&lt;/table&gt;</summary>
		<author><name>imported&gt;Unknown user</name></author>
	</entry>
	<entry>
		<id>https://hackerpedia.org/index.php?title=Dual-use_foundation_model&amp;diff=7143&amp;oldid=prev</id>
		<title>imported&gt;Unknown user at 01:42, 15 January 2026</title>
		<link rel="alternate" type="text/html" href="https://hackerpedia.org/index.php?title=Dual-use_foundation_model&amp;diff=7143&amp;oldid=prev"/>
		<updated>2026-01-15T01:42:27Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 01:42, 15 January 2026&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l1&quot;&gt;Line 1:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 1:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;{{LanguageHeader|en}}&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;{{LanguageHeader|en}}&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;{{CyberTerm|definition=&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&amp;lt;p&amp;gt;&lt;/del&gt;An AI model that is trained on broad data; generally uses self-supervision; contains at least tens of billions of parameters; is applicable across a wide range of contexts; and that exhibits, or could be easily modified to exhibit, high levels of performance at tasks that pose a serious risk to security, national economic security, national public health or safety, or any combination of those matters, such as by:&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&amp;lt;/p&amp;gt;&amp;lt;p style=&quot;margin-left:40px;&quot;&amp;gt;&lt;/del&gt;(i) substantially lowering the barrier of entry for non-experts to design, synthesize, acquire, or use chemical, biological, radiological, or nuclear (CBRN) weapons;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&amp;lt;/p&amp;gt;&amp;lt;p style=&quot;margin-left:40px;&quot;&amp;gt;&lt;/del&gt;(ii) enabling powerful offensive cyber operations through automated vulnerability discovery and exploitation against a wide range of potential targets of cyber attacks; or&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&amp;lt;/p&amp;gt;&amp;lt;p style=&quot;margin-left:40px;&quot;&amp;gt;&lt;/del&gt;(iii) permitting the evasion of human control or oversight through means of deception or obfuscation.&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&amp;lt;/p&amp;gt;&amp;lt;p&amp;gt;&lt;/del&gt;Models meet this definition even if they are provided to end users with technical safeguards that attempt to prevent users from taking advantage of the relevant unsafe capabilities.&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&amp;lt;/p&amp;gt;&lt;/del&gt;|source=NIST SP 800-218A}}&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;{{CyberTerm|definition=An AI model that is trained on broad data; generally uses self-supervision; contains at least tens of billions of parameters; is applicable across a wide range of contexts; and that exhibits, or could be easily modified to exhibit, high levels of performance at tasks that pose a serious risk to security, national economic security, national public health or safety, or any combination of those matters, such as by:(i) substantially lowering the barrier of entry for non-experts to design, synthesize, acquire, or use chemical, biological, radiological, or nuclear (CBRN) weapons;(ii) enabling powerful offensive cyber operations through automated vulnerability discovery and exploitation against a wide range of potential targets of cyber attacks; or(iii) permitting the evasion of human control or oversight through means of deception or obfuscation.Models meet this definition even if they are provided to end users with technical safeguards that attempt to prevent users from taking advantage of the relevant unsafe capabilities.|source=NIST SP 800-218A}}&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;

&lt;!-- diff cache key wiki:diff:1.41:old-1353:rev-7143:php=table --&gt;
&lt;/table&gt;</summary>
		<author><name>imported&gt;Unknown user</name></author>
	</entry>
	<entry>
		<id>https://hackerpedia.org/index.php?title=Dual-use_foundation_model&amp;diff=1353&amp;oldid=prev</id>
		<title>imported&gt;Unknown user at 00:12, 15 January 2026</title>
		<link rel="alternate" type="text/html" href="https://hackerpedia.org/index.php?title=Dual-use_foundation_model&amp;diff=1353&amp;oldid=prev"/>
		<updated>2026-01-15T00:12:26Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;{{LanguageHeader|en}}&lt;br /&gt;
{{CyberTerm|definition=&amp;lt;p&amp;gt;An AI model that is trained on broad data; generally uses self-supervision; contains at least tens of billions of parameters; is applicable across a wide range of contexts; and that exhibits, or could be easily modified to exhibit, high levels of performance at tasks that pose a serious risk to security, national economic security, national public health or safety, or any combination of those matters, such as by:&amp;lt;/p&amp;gt;&amp;lt;p style=&amp;quot;margin-left:40px;&amp;quot;&amp;gt;(i) substantially lowering the barrier of entry for non-experts to design, synthesize, acquire, or use chemical, biological, radiological, or nuclear (CBRN) weapons;&amp;lt;/p&amp;gt;&amp;lt;p style=&amp;quot;margin-left:40px;&amp;quot;&amp;gt;(ii) enabling powerful offensive cyber operations through automated vulnerability discovery and exploitation against a wide range of potential targets of cyber attacks; or&amp;lt;/p&amp;gt;&amp;lt;p style=&amp;quot;margin-left:40px;&amp;quot;&amp;gt;(iii) permitting the evasion of human control or oversight through means of deception or obfuscation.&amp;lt;/p&amp;gt;&amp;lt;p&amp;gt;Models meet this definition even if they are provided to end users with technical safeguards that attempt to prevent users from taking advantage of the relevant unsafe capabilities.&amp;lt;/p&amp;gt;|source=NIST SP 800-218A}}&lt;/div&gt;</summary>
		<author><name>imported&gt;Unknown user</name></author>
	</entry>
</feed>