Interesting. Seems like exploration is hard here. I’m curious how this compares to eliciting obfuscated reasoning by prompting (abstract, or with examples, or with step-by step instructions for an obfuscation scheme).
Interesting. Seems like exploration is hard here. I’m curious how this compares to eliciting obfuscated reasoning by prompting (abstract, or with examples, or with step-by step instructions for an obfuscation scheme).