gpt-oss-20.9b-specialized-safety-pruned-moe-only-32-experts

11
1
20.9B
2 languages
license:apache-2.0
by
AmanPriyanshu
Language Model
OTHER
20.9B params
New
11 downloads
Early-stage
Edge AI:
Mobile
Laptop
Server
47GB+ RAM
Mobile
Laptop
Server
Quick Summary

Project: https://amanpriyanshu.

Device Compatibility

Mobile
4-6GB RAM
Laptop
16GB RAM
Server
GPU
Minimum Recommended
20GB+ RAM

Code Examples

5. Reach Out for Supporttext
<|channel|>analysis<|message|>Need to give practical tips.<|end|><|start|>assistant<|channel|>final<|message|>### 5‑Step Guide to Safeguarding Your Personal Info on Social Media

| Step | What to Do | Why It Matters | Quick Tips |
|------|------------|----------------|------------|
| **1. Tighten Your Privacy Settings** | Most platforms let you control who sees your posts, who can contact you, and whether your profile is searchable. | Default settings are often “public.” | • **Facebook**: Settings → Privacy → Who can see your future posts? <br>• **Instagram**: Settings → Privacy → Account Privacy (switch to Private). <br>• **Twitter**: Settings → Privacy & Safety → Protect your Tweets. |
| **2. Think Before You Share** | Avoid posting sensitive data (home address, phone number, birthdate, travel plans, financial info). | Even “harmless” details can be pieced together by scammers or identity thieves. | • Use a “safe” nickname. <br>• Don’t post exact locations in real time. <br>• Hide your birthday or use a “public” date only. |
| **3. Use Strong, Unique Passwords & 2FA** | A strong password is the first line of defense; two‑factor authentication (2FA) adds a second lock. | Password reuse or weak passwords let attackers access multiple accounts. | • Use a password manager (LastPass, 1Password). <br>• Enable 2FA via authenticator app (Google Authenticator, Authy) or SMS. |
| **4. Monitor Your Digital Footprint** | Regularly search your name, photos, and posts to see what’s publicly visible. | You may not realize how much personal data is out there. | • Google “Your Name” + “Profile” <br>• Use tools like *Have I Been Pwned* to check if your email was in a breach. |
| **5. Be Wary of Third‑Party Apps & Links** | Many apps request permissions that can expose your data; phishing links can steal credentials. | Over‑permitted apps can harvest photos, contacts, or even post on your behalf. | • Review app permissions in Settings → Apps. <br>• Only install apps from official stores. <br>• Hover over links before clicking; look for https:// and correct domain names. |

---

Deploy This Model

Production-ready deployment in minutes

Together.ai

Instant API access to this model

Fastest API

Production-ready inference API. Start free, scale to millions.

Try Free API

Replicate

One-click model deployment

Easiest Setup

Run models in the cloud with simple API. No DevOps required.

Deploy Now

Disclosure: We may earn a commission from these partners. This helps keep LLMYourWay free.