x
Use of GPT-3 for identifying Phishing and other email based attacks? — LessWrong