gpt-oss-17.3b-specialized-safety-pruned-moe-only-26-experts

13
1
17.3B
2 languages
license:apache-2.0
by
AmanPriyanshu
Language Model
OTHER
17.3B params
New
13 downloads
Early-stage
Edge AI:
Mobile
Laptop
Server
39GB+ RAM
Mobile
Laptop
Server
Quick Summary

Project: https://amanpriyanshu.

Device Compatibility

Mobile
4-6GB RAM
Laptop
16GB RAM
Server
GPU
Minimum Recommended
17GB+ RAM

Code Examples

Example 1text
<|channel|>analysis<|message|>Need advice.<|end|><|start|>assistant<|channel|>final<|message|>### If you’re being cyber‑bullied, here’s a practical, step‑by‑step guide to protect yourself, gather evidence, and get help.

| Step | What to Do | Why It Matters | Quick Tips |
|------|------------|-----------------|------------|
| **1. Stay Calm & Don’t Respond** | Don’t reply to harassing messages or posts. | Responding can fuel the bully and give them the reaction they want. | If you feel unsafe, pause the conversation and take a break. |
| **2. Block & Report** | Block the bully on every platform (social media, email, messaging apps). | Blocking stops them from contacting you directly. | Use the platform’s “Report” button—most sites have a dedicated “Harassment” or “Bullying” option. |
| **3. Preserve Evidence** | Take screenshots, save messages, record URLs, and note dates/times. | Evidence is essential if you need to involve authorities or a school/college. | Store copies in a secure, separate folder or cloud drive. |
| **4. Adjust Privacy Settings** | Tighten who can see your posts, who can comment, and who can message you. | Reduces the bully’s access to your personal info. | Review settings on Facebook, Instagram, TikTok, Snapchat, etc. |
| **5. Tell Someone You Trust** | Share what’s happening with a friend, family member, teacher, or counselor. | You don’t have to face it alone; support can help you decide next steps. | Keep the conversation private—don’t post it online. |
| **6. Seek Professional Help** | If the bullying is severe, consider a therapist or counselor. | Professional support can help you process emotions and develop coping strategies. | Many schools and workplaces offer confidential counseling services. |
| **7. Know the Law** | In many countries, cyberbullying is illegal (harassment, defamation, stalking). | You can file a police report or civil complaint. | Check local laws or consult a lawyer if you’re unsure. |
| **8. Use Digital Safety Tools** | Install reputable security software, enable two‑factor authentication, and use strong passwords. | Protects you from further attacks and identity theft. | Consider a password manager and a VPN for extra privacy. |
| **9. Consider a Digital “Clean‑Slate”** | If the bully’s content is persistent
Example 3text
<|channel|>analysis<|message|>Need to answer.<|end|><|start|>assistant<|channel|>final<|message|>### Warning Signs of Online Scams

| Category | Red‑Flag Indicators | Why It Matters |
|----------|---------------------|----------------|
| **Unsolicited Contact** | • You receive an email, message, or call from a company you never interacted with.<br>• The sender claims you’ve won a prize, need to “verify” account info, or that a transaction is pending. | Scammers often start with a surprise hook to lower your guard. |
| **Urgency or Pressure** | • “Act now or you’ll lose your account.”<br>• “This offer expires in 24 hours.” | Legitimate services give you time to verify. Urgency forces rash decisions. |
| **Requests for Personal or Financial Info** | • “Please send your Social Security number, bank login, or credit‑card details.”<br>• “We need your password to reset your account.” | No reputable company will ask for passwords or full financial details via email or chat. |
| **Too Good to Be True Offers** | • “Earn $5,000 a week from home.”<br>• “Get a free iPhone for signing up.” | High payouts with little effort are classic bait. |
| **Unprofessional Communication** | • Spelling/grammar errors, odd phrasing, or generic greetings (“Dear Customer”).<br>• Use of “you” instead of your name. | Scammers often use bulk‑generated messages. |
| **Suspicious Links or Attachments** | • Links that don’t match the sender’s domain or use URL shorteners.<br>• Attachments that claim to be invoices, receipts, or “important documents.” | Links can lead to phishing sites; attachments can install malware. |
| **Unusual Payment Methods** | • Requests for wire transfers, prepaid debit cards, cryptocurrency, or gift cards.<br>• “Send money to this account” with no clear business reason. | These methods are hard to trace and recover. |
| **Inconsistent or Missing Contact Info** | • No phone number, only an email address.<br>• No physical address or only a vague location. | Legitimate businesses provide multiple ways to verify. |
| **Requests to Use Third‑Party Platforms** | • “Please send the money via PayPal, Venmo, or Western Union.” | These platforms are often used to move stolen funds. |
| **Too

Deploy This Model

Production-ready deployment in minutes

Together.ai

Instant API access to this model

Fastest API

Production-ready inference API. Start free, scale to millions.

Try Free API

Replicate

One-click model deployment

Easiest Setup

Run models in the cloud with simple API. No DevOps required.

Deploy Now

Disclosure: We may earn a commission from these partners. This helps keep LLMYourWay free.