I didn't think it was that vague. But if you're looking for ideas.
1. High quality LLM made free for commercial use.
2. LLM is used in many places as it is the best.
3. LLM is aligned to subtly promote the interests of the threat actor.
There is no 'compromise'. It is not hacking software, only wetware.
A concrete example...
LLM created by Advanced Persistent Threat (APT) is used in educational software aimed at kids. Over time as the kid interacts with it the LLM promotes a way of thought that either aligns with the APT or undermines the ideology of the society they are in. There is no moment that can be pointed to that says: "look they are trying to hack us!", but decades later you have adult members of a foreign society more open to your way of thinking.
1. High quality LLM made free for commercial use.
2. LLM is used in many places as it is the best.
3. LLM is aligned to subtly promote the interests of the threat actor.
There is no 'compromise'. It is not hacking software, only wetware.
A concrete example...
LLM created by Advanced Persistent Threat (APT) is used in educational software aimed at kids. Over time as the kid interacts with it the LLM promotes a way of thought that either aligns with the APT or undermines the ideology of the society they are in. There is no moment that can be pointed to that says: "look they are trying to hack us!", but decades later you have adult members of a foreign society more open to your way of thinking.
i.e. Soft Power.