<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>AI Agents Privacy Reviews | Future of Internet</title>
	<atom:link href="https://futureofinternet.xyz/category/ai-agents-privacy-reviews/feed/" rel="self" type="application/rss+xml" />
	<link>https://futureofinternet.xyz/category/ai-agents-privacy-reviews/</link>
	<description>Secure Systems for a Sovereign Future</description>
	<lastBuildDate>Wed, 24 Sep 2025 12:34:32 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9</generator>

<image>
	<url>https://futureofinternet.xyz/wp-content/uploads/2025/06/cropped-logo-512px-32x32.png</url>
	<title>AI Agents Privacy Reviews | Future of Internet</title>
	<link>https://futureofinternet.xyz/category/ai-agents-privacy-reviews/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>nilGPT : Privacy and Data Review 2025</title>
		<link>https://futureofinternet.xyz/ai-agents-privacy-reviews/llm-nilgpt-privacy-data-review-2025/</link>
		
		<dc:creator><![CDATA[futurofinternet]]></dc:creator>
		<pubDate>Wed, 13 Aug 2025 10:39:06 +0000</pubDate>
				<category><![CDATA[AI Agents & Privacy Reviews]]></category>
		<guid isPermaLink="false">https://futureofinternet.xyz/?p=1179</guid>

					<description><![CDATA[<p>At the heart of the Web3 revolution and the pursuit of sovereign, privacy-respecting AI, we present the nilGPT Privacy Data Review. This independent evaluation of Nillion Labs’ AI model is built on an exclusive framework and a rigorous audit of publicly available data, reflecting our vision of a future where privacy is treated as a [&#8230;]</p>
<p>L’article <a href="https://futureofinternet.xyz/ai-agents-privacy-reviews/llm-nilgpt-privacy-data-review-2025/">nilGPT : Privacy and Data Review 2025</a> est apparu en premier sur <a href="https://futureofinternet.xyz">Future of Internet</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p data-start="218" data-end="581">At the heart of the Web3 revolution and the pursuit of sovereign, privacy-respecting AI, we present the <a href="https://nilgpt.xyz/?utm_content=futureofinternet" target="_blank" rel="noopener">nilGPT</a> Privacy Data Review. This independent evaluation of Nillion Labs’ AI model is built on an exclusive framework and a rigorous audit of publicly available data, reflecting our vision of a future where privacy is treated as a fundamental right.</p>
<p data-start="583" data-end="777">The scoring system follows a comprehensive guide created specifically for this project, accessible here, and evolves dynamically with innovations and feedback from the decentralized community.</p>
<p data-start="583" data-end="777">This <a href="https://nilgpt.xyz/?utm_content=futureofinternet" target="_blank" rel="noopener">nilGPT</a> Privacy Data Review reinforces our mission to promote transparency, data protection, and digital sovereignty for AI users. Our goal remains clear: to enlighten and inform, without filter or influence, so we can build together a fairer and more transparent AI ecosystem.</p>
<p><em>update : 25/09/21</em></p>
<h2>Key Findings from the nilGPT Privacy Data Review</h2>
<h2>Model</h2>
<p>Meta-Llama-3.1-8B currently, with experimental DeepSeek integration; roadmap towards Llama-3.1-70B and Gemma-3-27B-IT in the coming weeks.</p>
<hr />
<h2>Data Collection</h2>
<p><strong>Prompts stored:</strong> Chat histories are securely stored in nilDB, a decentralized MPC-based storage network, where no data can be reconstructed or leaked even in case of compromise. <span style="color: #4ade80;"><strong>A</strong></span></p>
<p><strong>Use for training:</strong> No, inputs/outputs are not used to train any AI model, ensuring data confidentiality. <span style="color: #4ade80;"><strong>A</strong></span></p>
<p><strong>Account required:</strong> Registration via email or wallet. Pseudonymity is possible, but an account is always required. <span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3"><span style="color: #fbbf24;"><strong>B</strong></span></span></span></p>
<p><strong>Data retention duration:</strong> Data is stored in nilDB and fully controlled by the user. Since September 2025, in-app deletion ensures immediate and user-managed data removal. <span style="color: #4ade80;"><strong>A</strong></span></p>
<hr />
<h2>User Control</h2>
<p><strong>Deletion possible:</strong> Yes, in-app deletion is now available (September 2025 release), while export remains limited to manual requests. <span style="color: #4ade80;"><strong>A</strong></span></p>
<p><strong>Export possible:</strong> Users can request full access and data portability in compliance with GDPR. Although export is handled via support, it guarantees users’ right to recover their data. <span style="color: #4ade80;"><strong>A</strong></span></p>
<p><strong>Granularity control: </strong>There are no fine-grained controls within the app to choose what is collected or stored. <span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3"><strong><strong style="color: #f97316;">C</strong></strong></span></span></p>
<p><strong>Explicit user consent:</strong> Obtained where legally required (e.g., marketing), but no strong evidence of explicit, easy consent for all processing activities. <span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3"><strong><strong style="color: #f97316;">C</strong></strong></span></span></p>
<hr />
<h2>Transparency</h2>
<p><strong>Clear policy:</strong> Accessible, detailed, and up-to-date (July 2025). <span style="color: #4ade80;"><strong>A</strong></span></p>
<p><strong>Change notification:</strong> Users are informed of material changes with updated effective dates. <span style="color: #4ade80;"><strong>A</strong></span></p>
<p><strong>Model documentation:</strong> Models are listed with references; source code was published on GitHub in September 2025 (NillionNetwork/<a href="https://nilgpt.xyz/?utm_content=futureofinternet" target="_blank" rel="noopener">nilgpt</a>), along with initial technical documentation and a clear roadmap for further releases. <span style="color: #4ade80;"><strong>A</strong></span> <!-- notionvc: 09b2add5-d980-42fd-bf1c-1dee9326fa9c --></p>
<hr />
<h2>Privacy by Design</h2>
<p><strong>Encryption (core &amp; advanced):</strong> Inputs/outputs are encrypted locally in the browser using a user-chosen passphrase (which never leaves the device), then secret-shared across nilDB nodes. Models run within TEEs, and the entire backend operates on nilCC (Nillion’s confidential compute layer). All data is encrypted in transit and at rest. <span style="color: #4ade80;"><strong>A</strong></span></p>
<p><strong>Privacy-Enhancing Technologies:</strong> MPC for data at rest, TEEs for inference. Differential privacy/federated learning not needed in current model. <span style="color: #4ade80;"><strong>A</strong></span></p>
<p><strong>Auditability &amp; Certification:</strong> No third-party audits yet. Initial source code was published on GitHub in September 2025, but independent verification is still pending. <span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3"><strong><strong style="color: #f97316;">C</strong></strong></span></span></p>
<p><strong>Transparency &amp; Technical Documentation:</strong> Architecture and privacy principles are publicly documented, with source code released in September 2025. Documentation covers core privacy and technical measures, with additional details planned. <span style="color: #4ade80;"><strong>A</strong></span><!-- notionvc: 6b74fe7f-16b1-42c2-ad49-df9b526cca5c --></p>
<p><strong>User-Configurable Privacy Features:</strong> Architecture and privacy principles are described publicly; in-app data deletion is now available (September 2025 release), but fine-grained privacy controls and complete documentation are still missing. <span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3"><strong><strong style="color: #f97316;">C</strong></strong></span></span></p>
<hr />
<h2>Hosting &amp; Sovereignty</h2>
<p><strong>Sovereignty: <span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3"><span style="color: #fbbf24;">B</span></span></span></strong></p>
<ul>
<li>The backend of <a href="https://nilgpt.xyz/?utm_content=futureofinternet" target="_blank" rel="noopener">NilGPT</a> is hosted in nilCC, which uses Nillion&#8217;s bare metal servers in Virginia.</li>
<li>nilDB nodes are used for data storage.</li>
<li>There are 3 nodes used for <a href="https://nilgpt.xyz/?utm_content=futureofinternet" target="_blank" rel="noopener">NilGPT</a>, one managed by Nillion and the other two by external parties.</li>
</ul>
<p><strong>Legal jurisdiction: </strong>Nillion Labs is a company based in Ireland, and the data collected by NilGPT is subject to Irish (EU) law and the General Data Protection Regulation (GDPR). <span style="color: #4ade80;"><strong>A</strong></span></p>
<p><strong>Local option: </strong>It is not possible to host <a href="https://nilgpt.xyz/?utm_content=futureofinternet" target="_blank" rel="noopener">NilGPT</a> locally, as it is only accessible via a web application. <strong><strong style="color: #dc2626;">D</strong></strong></p>
<p><strong>Big Tech dependence: </strong><a href="https://nilgpt.xyz/?utm_content=futureofinternet" target="_blank" rel="noopener">NilGPT</a> does not rely on public cloud infrastructure. In fact, nilCC, which hosts the backend and runs AI models, runs on bare metal, while nilDB nodes can be hosted anywhere without compromising user data security and confidentiality. <span style="color: #4ade80;"><strong>A</strong></span></p>
<hr />
<h2>Open Source</h2>
<p><strong>Publicly available model:</strong> The <a href="https://nilgpt.xyz/?utm_content=futureofinternet" target="_blank" rel="noopener">nilGPT</a> application code was released in September 2025 on GitHub (NillionNetwork/nilgpt). The first version is fully accessible to the public, marking the beginning of its open-source journey. <span style="color: #4ade80;"><strong>A</strong></span></p>
<p><strong>Clear open source license:</strong> The models operate under specific licenses (Llama, DeepSeek). The application’s license was partially disclosed with the September 2025 open-source release, but a complete open source license for all modules is still pending. <span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3"><span style="color: #fbbf24;"><strong>B</strong></span></span></span></p>
<p><strong>Inference code available:</strong> Models are open source. Initial inference code was published on GitHub in September 2025, but it remains partial and lacks full documentation and audits. <span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3"><span style="color: #fbbf24;"><strong>B</strong></span></span></span><strong> </strong></p>
<hr />
<h2>Remarks</h2>
<div>
<p data-start="119" data-end="1192"><a href="https://nilgpt.xyz/?utm_content=futureofinternet">NilGPT</a>, developed by Nillion Labs, implements advanced privacy engineering, with user data split and stored using MPC, encrypted, and processed within secure Trusted Execution Environments (TEEs). The platform operates independently of Big Tech cloud infrastructure, relying instead on sovereign bare-metal hosting. Its policies are detailed, transparent, and regularly updated. The models in use are open source with specific licenses (Llama, DeepSeek), and <a href="https://nilgpt.xyz/?utm_content=futureofinternet" target="_blank" rel="noopener">NilGPT</a>’s own application code was open-sourced in September 2025, marking the beginning of its licensing and documentation process. As of September 2025, both in-app, self-service data deletion and a first public open-source release have been delivered. Further audits and comprehensive technical documentation are still pending, but these milestones already strengthen <a href="https://nilgpt.xyz/?utm_content=futureofinternet" target="_blank" rel="noopener">NilGPT</a>’s privacy and sovereignty profile. Upcoming audits and full documentation, combined with its existing robust architecture, are expected to further consolidate this profile. A re-evaluation is planned once these changes are implemented.</p>
</div>
<hr />
<h2><span style="font-family: Roboto, sans-serif; font-size: 27px;">nilGPT Privacy Data Review : Overall Score</span></h2>
<div>
<div>
<p><strong><span class="dropcap">78.3/100</span></strong></p>
</div>
<p>&nbsp;</p>
<p>&nbsp;</p>
</div>
<div>
<ul>
<li data-start="1647" data-end="1677">Data Collection : 20 + 20 + 15 + 20 = 75</li>
<li data-start="1647" data-end="1677">User Control : 20 + 20 + 5 + 5 = 50</li>
<li data-start="1647" data-end="1677">Transparency : 20 + 20 + 20 = 60</li>
<li data-start="1647" data-end="1677">Privacy by Design : 20 + 20 + 5 + 20 + 5 = 70</li>
<li data-start="1647" data-end="1677">Hosting &amp; Sovereignty : 15 + 20 + 0 + 20 = 55</li>
<li data-start="1647" data-end="1677">Open Source : 20 + 15 + 15 = 45</li>
</ul>
<p><strong>Total : 75 + 50 + 60 + 70 + 55 + 50 = 360</strong></p>
<p data-start="1293" data-end="1345">23 x 20 = 460</p>
<p data-start="1293" data-end="1345"><strong>360 / 460 × 100 = 78.3 </strong></p>
<div>
<hr />
<p data-pm-slice="1 1 []"><em>This evaluation is provided for informational purposes only and reflects a subjective analysis based on publicly available data at the time of publication. We do not guarantee absolute accuracy and disclaim all liability for errors or misinterpretations. Any disputes must be submitted in writing to <a href="mailto:futurofintenet@proton.me" target="_blank" rel="noopener">futurofintenet@proton.me</a></em></p>
<p data-pm-slice="1 1 []"><em>For full methodology, see our complete scoring guide here: <a href="https://futureofinternet.xyz/ai-agents/ai-agents-privacy-data-rating-guide-2025/">LLM Privacy Rating Guide</a></em></p>
</div>
</div>
<p>L’article <a href="https://futureofinternet.xyz/ai-agents-privacy-reviews/llm-nilgpt-privacy-data-review-2025/">nilGPT : Privacy and Data Review 2025</a> est apparu en premier sur <a href="https://futureofinternet.xyz">Future of Internet</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Perplexity : Privacy and Data Review 2025</title>
		<link>https://futureofinternet.xyz/ai-agents-privacy-reviews/perplexity-privacy-review-2025-global-ai-data-sovereignty/</link>
		
		<dc:creator><![CDATA[futurofinternet]]></dc:creator>
		<pubDate>Wed, 13 Aug 2025 09:50:26 +0000</pubDate>
				<category><![CDATA[AI Agents & Privacy Reviews]]></category>
		<guid isPermaLink="false">https://futureofinternet.xyz/?p=1182</guid>

					<description><![CDATA[<p>Amid the Web3 revolution and the growing movement toward sovereign, privacy-respecting AI, our Perplexity Privacy Review 2025 delivers a thorough, independent assessment of how Perplexity approaches data protection, transparency, and user control. Drawing on an exclusive evaluation framework and an in-depth audit of publicly available information, this review examines everything from prompt storage and AI [&#8230;]</p>
<p>L’article <a href="https://futureofinternet.xyz/ai-agents-privacy-reviews/perplexity-privacy-review-2025-global-ai-data-sovereignty/">Perplexity : Privacy and Data Review 2025</a> est apparu en premier sur <a href="https://futureofinternet.xyz">Future of Internet</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p data-start="141" data-end="500">Amid the Web3 revolution and the growing movement toward sovereign, privacy-respecting AI, our <strong data-start="308" data-end="342">Perplexity Privacy Review 2025</strong> delivers a thorough, independent assessment of how <a href="https://www.perplexity.ai" target="_blank" rel="noopener">Perplexity</a> approaches data protection, transparency, and user control. Drawing on an exclusive evaluation framework and an in-depth audit of publicly available information, this review examines everything from prompt storage and AI training practices to hosting sovereignty and Big Tech dependencies. It reflects our commitment to a future where digital privacy is treated not as a feature, but as a fundamental right.</p>
<p data-start="502" data-end="720">The scoring system follows a comprehensive guide created specifically for this project, accessible here, and is designed to adapt dynamically as innovations emerge and feedback comes from the decentralized community.</p>
<p data-start="722" data-end="863">Our mission is clear: to enlighten and inform, without filter or influence; so we can build together a fairer, more transparent AI ecosystem.</p>
<p><em>update : 25/08/11</em></p>
<h2>Key Insights from the Perplexity Privacy Review 2025</h2>
<h2>Model</h2>
<p><strong>Perplexity Engine</strong> (core AI), <strong>Perplexity Pro</strong> (paid subscription, with Enterprise tiers that have stricter data retention controls), <strong>Comet Browser</strong> (standalone, privacy-focused browser with ad-driven data collection and its own privacy notice).</p>
<hr />
<h2>Data Collection</h2>
<p><strong>Prompts stored: </strong>Indefinite storage of prompts and interactions without immediate deletion guarantees undermines user control. Perplexity should implement a clear 90-day retention limit for non-essential data and offer instant deletion options via a user dashboard. <span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3"><strong><strong style="color: #f97316;">C</strong></strong></span></span></p>
<p><strong>Use for training:</strong>Using prompts for AI training by default with opt-out and no guaranteed anonymization risks user privacy. Perplexity must default to opt-in for training use and publish a detailed anonymization protocol to ensure data is untraceable. <span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3"><strong><strong style="color: #f97316;">C</strong></strong></span></span></p>
<p><strong>Account required: </strong>Requiring a Perplexity account for full features, including personal info like email and name, limits accessibility for privacy-conscious users. Allow full Comet Browser functionality without an account or minimize mandatory data to just an email address. <span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3"><span style="color: #fbbf24;"><strong>B</strong></span></span></span></p>
<p><strong>Data retention duration:</strong> Consumer data is retained as long as “reasonably necessary” for business purposes, with no strict short-term cap. Deletion is possible upon request for most users, but not automatic. Enterprise files are deleted after 7 days by default. <span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3"><strong><strong style="color: #f97316;">C</strong></strong></span></span></p>
<hr />
<h2>User Control</h2>
<p><strong>Deletion possible: </strong>Data deletion within 30 days is too slow and requires manual requests. Perplexity should offer a one-click deletion tool in the user interface with a 7-day processing guarantee. <span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3"><span style="color: #fbbf24;"><strong>B</strong></span></span></span></p>
<p><strong>Export possible: </strong>Manual data export processes are cumbersome and user-unfriendly. Develop an automated export tool in the account settings to provide downloadable data in standard formats like CSV or JSON. <span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3"><strong><strong style="color: #f97316;">C</strong></strong></span></span></p>
<p><strong>Granularity control: </strong>Limited control over specific data types, like browsing history, restricts user autonomy. Introduce detailed settings to let users toggle data collection for individual features, such as search history or ad tracking. <span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3"><span style="color: #fbbf24;"><strong>B</strong></span></span></span></p>
<p><strong>Explicit user consent: </strong>Relying on “legitimate interest” for non-sensitive data processing sidesteps user choice. Require explicit, granular consent for all data processing activities, aligning with GDPR-like standards. <span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3"><strong><strong style="color: #f97316;">C</strong></strong></span></span></p>
<hr />
<h2>Transparency</h2>
<p><strong>Clear policy: </strong>The detailed privacy policy risks being inaccessible to non-technical users due to legal jargon. Simplify the policy with plain language summaries and multilingual translations to reach a broader audience. <span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3"><span style="color: #fbbf24;"><strong>B</strong></span></span></span></p>
<p><strong>Change notification: </strong>Relying on users to check for minor policy updates is inconvenient and opaque. Implement proactive notifications via email and in-app alerts for all policy changes, with a 30-day advance notice for material updates. <span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3"><span style="color: #fbbf24;"><strong>B</strong></span></span></span></p>
<p><strong>Model documentation: </strong>No public technical documentation on AI models erodes trust. Publish high-level model cards outlining training data sources and architecture without compromising proprietary details. <span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3"><strong><strong style="color: #f97316;">C</strong></strong></span></span></p>
<hr />
<h2>Privacy by Design</h2>
<p><strong>Encryption (core &amp; advanced): </strong>Claiming standard encryption without advanced privacy tech like homomorphic encryption or zero-knowledge proofs is insufficient. Adopt and document at least one advanced privacy-enhancing technology, such as secure multi-party computation, within 12 months. <span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3"><strong><strong style="color: #f97316;">C</strong></strong></span></span></p>
<p><strong>Privacy-Enhancing Technologies:  </strong>Perplexity relies on standard encryption without advanced privacy-enhancing technologies like zero-knowledge proofs, weakening its privacy framework. Adopt a PET, such as homomorphic encryption, within 12 months and publish a clear explanation of its implementation to enhance user trust. <span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3"><strong><strong style="color: #f97316;">C</strong></strong></span></span></p>
<p><strong>Auditability &amp; Certification: </strong>Lack of third-party audits undermines credibility. Perplexity should commit to annual SOC 2 or ISO 27001 audits and publish summary reports to validate privacy practices. <strong><strong style="color: #dc2626;">D</strong></strong></p>
<p><strong>Transparency &amp; Technical Documentation: </strong>Policy transparency exists, but technical details are absent. Share a public technical overview of data flows and encryption standards to demonstrate privacy commitment. <span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3"><strong><strong style="color: #f97316;">C</strong></strong></span></span></p>
<p><strong>User-Configurable Privacy Features: </strong>Moderate controls for cookies and tracking are a start, but gaps remain for other data types. Add comprehensive privacy settings, like disabling specific data collection categories (e.g., location, search queries), in a centralized dashboard. <span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3"><span style="color: #fbbf24;"><strong>B</strong></span></span></span></p>
<hr />
<h2>Hosting &amp; Sovereignty</h2>
<p><strong>Sovereignty: </strong>Exclusive US hosting with cross-border transfers conflicts with global privacy laws like GDPR. Offer EU and APAC data residency options by 2026 to comply with regional regulations and enhance user trust. <strong><strong style="color: #dc2626;">D</strong></strong></p>
<p><strong>Legal jurisdiction: </strong>California-based jurisdiction and Data Privacy Framework oversight may concern international users. Clarify DPF protections and offer contractual safeguards for non-US users to address jurisdictional risks. <strong><strong style="color: #dc2626;">D</strong></strong></p>
<p><strong>Local option: </strong>No offline or local deployment options limit privacy-focused use cases. Develop an offline mode for Comet Browser or local processing for enterprise users within 18 months. <strong><strong style="color: #dc2626;">D</strong></strong></p>
<p><strong>Big Tech dependency: </strong>Reliance on OpenAI and Anthropic introduces third-party privacy risks. Publish a risk mitigation plan, including data isolation guarantees, and explore in-house model development to reduce dependency. <span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3"><strong><strong style="color: #f97316;">C</strong></strong></span></span></p>
<hr />
<h2>Open Source</h2>
<p><strong>Publicly available model: </strong>The fully proprietary model blocks transparency and community trust. Release a limited, non-commercial version of the model or its weights to encourage research and align with open AI trends. <strong><strong style="color: #dc2626;">D</strong></strong></p>
<p><strong>Clear open source license: </strong>Perplexity’s fully proprietary platform lacks any open-source licensing, limiting transparency and developer engagement. To improve, Perplexity could provide a public API or sample code to support privacy-focused development while maintaining proprietary control. <strong><strong style="color: #dc2626;">D</strong></strong></p>
<p><strong>Inference code available: </strong>No public inference code stifles innovation and trust. Provide sample inference code or an open API sandbox for developers to test privacy-preserving features. <strong><strong style="color: #dc2626;">D</strong></strong></p>
<hr />
<h2>Remarks</h2>
<div>Perplexity provides a clear, updated privacy policy and moderate user controls, such as opt-out for AI training, granular Comet Browser settings, and account/data deletion options. However, indefinite consumer data retention, lack of technical transparency (no public audits, model cards, or PET details), concerns over web scraping compliance, US-only hosting with cross-border transfers, ad-driven tracking in Comet Browser (unless manually disabled), full proprietary design, Big Tech infrastructure dependency, and absence of local or sovereign deployment options significantly undermine its privacy commitments.</div>
<div></div>
<div>
<hr />
</div>
<h2><span style="font-family: Roboto, sans-serif; font-size: 27px;">Perplexity Privacy Review 2025: Overall Score</span></h2>
<div>
<div>
<p><strong><span class="dropcap">30.4/100</span></strong></p>
</div>
<p>&nbsp;</p>
<p>&nbsp;</p>
</div>
<div>
<ul>
<li data-start="123" data-end="351">Data Collection: 5 + 5 + 15 + 5 = <strong>30</strong></li>
<li data-start="123" data-end="351">User Control: 15 + 5 + 15 + 5 = <strong>40</strong></li>
<li data-start="123" data-end="351">Transparency: 15 + 15 + 5 = <strong>35</strong></li>
<li data-start="123" data-end="351">Privacy by Design: 5 + 5 + 0 + 5 + 15 = <strong>30</strong></li>
<li data-start="123" data-end="351">Hosting &amp; Sovereignty: 0 + 0 + 0 + 5 = <strong>5</strong></li>
<li data-start="123" data-end="351">Open Source: 0 + 0 + 0 = <strong>0</strong></li>
</ul>
<p data-start="353" data-end="393"><strong>Total: 30 + 40 + 35 + 30 + 5 + 0 = 140</strong></p>
<p data-start="395" data-end="410">23 × 20 = 460</p>
<p data-start="412" data-end="441"><strong>140 / 460 × 100 = 30.43</strong></p>
<div>
<hr />
<p data-pm-slice="1 1 []"><em>This evaluation of Grok 4 Privacy Review is provided for informational purposes only and reflects a subjective analysis based on publicly available data at the time of publication. We do not guarantee absolute accuracy and disclaim all liability for errors or misinterpretations. Any disputes must be submitted in writing to <a href="mailto:futurofintenet@proton.me" target="_blank" rel="noopener">futurofintenet@proton.me</a></em></p>
<p data-pm-slice="1 1 []"><em>For full methodology, see our complete scoring guide here: <a href="https://futureofinternet.xyz/ai-agents-privacy-reviews/ai-agents-privacy-data-rating-guide-2025/">LLM Privacy Rating Guide</a></em></p>
</div>
</div>
<p>L’article <a href="https://futureofinternet.xyz/ai-agents-privacy-reviews/perplexity-privacy-review-2025-global-ai-data-sovereignty/">Perplexity : Privacy and Data Review 2025</a> est apparu en premier sur <a href="https://futureofinternet.xyz">Future of Internet</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Grok 4 : Privacy and Data Review 2025</title>
		<link>https://futureofinternet.xyz/ai-agents-privacy-reviews/grok-4-privacy-data-review-2025-global/</link>
		
		<dc:creator><![CDATA[futurofinternet]]></dc:creator>
		<pubDate>Tue, 12 Aug 2025 07:11:50 +0000</pubDate>
				<category><![CDATA[AI Agents & Privacy Reviews]]></category>
		<guid isPermaLink="false">https://futureofinternet.xyz/?p=1184</guid>

					<description><![CDATA[<p>Grok 4 Privacy Review 2025 is our independent evaluation of xAI’s Grok 4 and Grok 4 Heavy, set against the backdrop of the Web3 revolution and the quest for sovereign, privacy-respecting AI. Based on an exclusive framework and a rigorous audit of publicly available data, this review reflects our vision of a future where privacy [&#8230;]</p>
<p>L’article <a href="https://futureofinternet.xyz/ai-agents-privacy-reviews/grok-4-privacy-data-review-2025-global/">Grok 4 : Privacy and Data Review 2025</a> est apparu en premier sur <a href="https://futureofinternet.xyz">Future of Internet</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p data-start="141" data-end="500"><strong data-start="141" data-end="171">Grok 4 Privacy Review 2025</strong> is our independent evaluation of xAI’s <a href="https://x.com/i/grok" target="_blank" rel="noopener">Grok 4</a> and Grok 4 Heavy, set against the backdrop of the Web3 revolution and the quest for sovereign, privacy-respecting AI. Based on an exclusive framework and a rigorous audit of publicly available data, this review reflects our vision of a future where privacy is a fundamental right.</p>
<p data-start="502" data-end="720">The scoring system follows a comprehensive guide created specifically for this project, accessible here, and is designed to adapt dynamically as innovations emerge and feedback comes from the decentralized community.</p>
<p data-start="722" data-end="863">Our mission is clear: to enlighten and inform, without filter or influence, so we can build together a fairer, more transparent AI ecosystem.</p>
<p><em>update : 25/08/11</em></p>
<h2>Key Insights from the Grok 4 Privacy Data Review 2025</h2>
<h2>Model</h2>
<p>Grok 4 / Grok 4 Heavy</p>
<hr />
<h2>Data Collection</h2>
<p><strong>Prompts stored: </strong>User Content, including prompts, multimodal inputs (images/audio/video), and outputs, is stored with AES-256 encryption at rest and TLS 1.3 in transit; Private Chat ensures deletion within 30 days barring legal/safety exceptions, while standard chats persist for business needs. <span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3"><strong><strong style="color: #f97316;">C</strong></strong></span></span></p>
<p><strong>Use for training: </strong>User Content may train models unless opted out via settings, with public internet data and X posts (potentially containing personal info) used unrestricted; de-identification via hashed identifiers mitigates risks but doesn&#8217;t prevent incidental sensitive data inference. <span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3"><strong><strong style="color: #f97316;">C</strong></strong></span></span></p>
<p><strong>Account required: </strong>Mandatory accounts collect Account Data (name, credentials, DOB) and third-party login info (e.g., X profile, Google ID), enforcing age gates (13+ with parental consent for minors); this enables persistent tracking via IP-derived Technical Data. <span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3"><strong><strong style="color: #f97316;">C</strong></strong></span></span></p>
<p><strong>Data retention duration: </strong>Retention aligns with legitimate business purposes, potentially indefinite for legal/compliance, with no universal cap; Private Chat limits to 30 days max, emphasizing data minimization principles. <span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3"><strong><strong style="color: #f97316;">C</strong></strong></span></span></p>
<hr />
<h2>User Control</h2>
<p><strong>Deletion possible: </strong>Users request conversation or account deletion via settings or privacy portal, processed in 30 days subject to legal holds; automated queuing ensures efficiency but exceptions for safety/security persist. <span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3"><span style="color: #fbbf24;"><strong>B</strong></span></span></span></p>
<p><strong>Export possible: </strong>Data access requests under GDPR/CCPA yield personal info copies via Relyance portal, though not self-service or multi-format; appeals process adds user recourse. <span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3"><span style="color: #fbbf24;"><strong>B</strong></span></span></span></p>
<p><strong>Granularity control: </strong>Binary toggles for training opt-out and Private Chat activation provide basic control over data use and visibility; lacks per-data-type or feature-level granularity. <span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3"><span style="color: #fbbf24;"><strong>B</strong></span></span></span></p>
<p><strong>Explicit user consent: </strong>Consent mandated for precise location via GPS/third-parties, withdrawable anytime; core processing relies on terms acceptance with implied consent for training, advising against sensitive inputs. <span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3"><span style="color: #fbbf24;"><strong>B</strong></span></span></span></p>
<hr />
<h2>Transparency</h2>
<p><strong>Clear policy: </strong>Comprehensive policy details data categories, uses, and rights with examples, integrated FAQs on training sources; effective July 10, 2025, it promotes transparency via direct links. <span style="color: #4ade80;"><strong>A</strong></span></p>
<p><strong>Change notification: </strong>Updates posted with new effective dates, proportional notices (e.g., email/in-Service) for material EU changes; global users lack proactive alerts beyond page revisions. <span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3"><span style="color: #fbbf24;"><strong>B</strong></span></span></span></p>
<p><strong>Model documentation: </strong>High-level overviews cover reasoning, 256k context, multimodal support; no deep disclosures on architecture blueprints, parameter scales, or training pipelines. <span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3"><strong><strong style="color: #f97316;">C</strong></strong></span></span></p>
<hr />
<h2>Privacy by Design</h2>
<p><strong>Encryption (core &amp; advanced): </strong>Implements AES-256 at-rest encryption, TLS 1.3 transit protection, and hashed de-identification; absent advanced PETs like homomorphic encryption or differential privacy. <span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3"><span style="color: #fbbf24;"><strong>B</strong></span></span></span></p>
<p><strong>Privacy-Enhancing Technologies: </strong>Data minimization via opt-outs and aggregation, anonymization for deidentified data; no production-scale federated learning or zero-knowledge proofs evident. <span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3"><strong><strong style="color: #f97316;">C</strong></strong></span></span></p>
<p><strong>Auditability &amp; Certification: </strong>SOC 2 Type 2, GDPR, CCPA compliance claimed, with audit reports/certifications available on request; third-party verifications support but lack public disclosure. <span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3"><span style="color: #fbbf24;"><strong>B</strong></span></span></span></p>
<p><strong>Transparency &amp; Technical Documentation: </strong>Policy offers high-level security flows and trust statements; omits detailed architecture diagrams or data lineage maps. <span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3"><strong><strong style="color: #f97316;">C</strong></strong></span></span></p>
<p><strong>User-Configurable Privacy Features: </strong>Private Chat for ephemeral storage and training opt-out toggles enable basic customization; no advanced profiles or granular PET integrations. <span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3"><span style="color: #fbbf24;"><strong>B</strong></span></span></span></p>
<hr />
<h2>Hosting &amp; Sovereignty</h2>
<p><strong>Sovereignty: </strong>Primarily U.S.-hosted on Colossus supercluster in Tennessee, with no regional sovereignty options; relies on domestic infrastructure for training/deployment. <strong><strong style="color: #dc2626;">D</strong></strong></p>
<p><strong>Legal jurisdiction: </strong>Governed by Texas law under Nevada-based X.AI LLC, weaker than EU standards despite GDPR claims for Europeans; disputes centralized in Tarrant County courts. <strong><strong style="color: #dc2626;">D</strong></strong></p>
<p><strong>Local option: </strong>Exclusively cloud/API-based, no self-hosted or on-premises variants; international transfers use SCCs for compliance. <strong><strong style="color: #dc2626;">D</strong></strong></p>
<p><strong>Big Tech dependency: </strong>Engages subprocessors like Oracle Cloud, NVIDIA GPUs, AWS for scaling; in-house Colossus mitigates but sustains reliance on hyperscalers. <span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3"><strong><strong style="color: #f97316;">C</strong></strong></span></span></p>
<hr />
<h2>Open Source</h2>
<p><strong>Publicly available model: </strong>Grok 4 remains fully proprietary, unlike Grok-1&#8217;s Apache 2.0 release; weights and internals closed to public. <strong><strong style="color: #dc2626;">D</strong></strong></p>
<p><strong>Clear open source license: </strong>No OSS license applies; access restricted to API/subscriptions. <strong><strong style="color: #dc2626;">D</strong></strong></p>
<p><strong>Inference code available: </strong>Inference via hosted API only, no public code or downloadable models; supports text/vision but not open execution. <strong><strong style="color: #dc2626;">D</strong></strong></p>
<hr />
<h2>Remarks</h2>
<div>
<div>Grok 4 offers practical user controls like training opt-outs and Private Chat for reduced retention, alongside compliance with key regulations like GDPR and CCPA, integrating hashed de-identification and SCCs for international transfers. However, the core model and infrastructure are proprietary and U.S.-centric, with indefinite retention possible for legal/safety reasons and reliance on Big Tech partners like Oracle and NVIDIA; data export/deletion are available but not instant or fully automated, transparency shines in policy clarity but falters in technical depth, and recent 2025 updates emphasize reasoning and multimodal features, but privacy enhancements remain incremental, sparking debates over surveillance, data scraping, AI ethics, and trust in systems, with no major shifts in open sourcing or sovereignty, limiting decentralized adoption.</div>
<div></div>
</div>
<hr />
<p><span style="color: #111111; font-family: Roboto, sans-serif; font-size: 27px;">Grok 4 Privacy Review: Overall Score</span></p>
<div>
<div>
<p><strong><span class="dropcap">39.1/100</span></strong></p>
</div>
<p>&nbsp;</p>
<p>&nbsp;</p>
</div>
<div>
<ul>
<li data-start="123" data-end="351">Data Collection: 5 + 5 + 5 + 5 = <strong>20</strong></li>
<li data-start="123" data-end="351">User Control: 15 + 15 + 15 + 15 = <strong>60</strong></li>
<li data-start="123" data-end="351">Transparency: 20 + 15 + 5 = <strong>40</strong></li>
<li data-start="123" data-end="351">Privacy by Design: 15 + 5 + 15 + 5 + 15 = <strong>55</strong></li>
<li data-start="123" data-end="351">Hosting &amp; Sovereignty: 0 + 0 + 0 + 5 = <strong>5</strong></li>
<li data-start="123" data-end="351">Open Source: 0 + 0 + 0 = <strong>0</strong></li>
</ul>
<p data-start="353" data-end="393"><strong>Total: 20 + 60 + 40 + 55 + 5 + 0 = 180</strong></p>
<p data-start="395" data-end="410">23 × 20 = 460</p>
<p data-start="412" data-end="441">180 / 460 × 100 = <strong data-start="430" data-end="439">39.13</strong></p>
<div>
<hr />
<p data-pm-slice="1 1 []"><em>This evaluation of Grok 4 Privacy Review is provided for informational purposes only and reflects a subjective analysis based on publicly available data at the time of publication. We do not guarantee absolute accuracy and disclaim all liability for errors or misinterpretations. Any disputes must be submitted in writing to <a href="mailto:futurofintenet@proton.me" target="_blank" rel="noopener">futurofintenet@proton.me</a></em></p>
<p data-pm-slice="1 1 []"><em>For full methodology, see our complete scoring guide here: <a href="https://futureofinternet.xyz/ai-agents-privacy-reviews/ai-agents-privacy-data-rating-guide-2025/">LLM Privacy Rating Guide</a></em></p>
</div>
</div>
<p>L’article <a href="https://futureofinternet.xyz/ai-agents-privacy-reviews/grok-4-privacy-data-review-2025-global/">Grok 4 : Privacy and Data Review 2025</a> est apparu en premier sur <a href="https://futureofinternet.xyz">Future of Internet</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Qwen 3 : Privacy and Data Review 2025</title>
		<link>https://futureofinternet.xyz/ai-agents-privacy-reviews/qwen-3-privacy-data-review-2025/</link>
		
		<dc:creator><![CDATA[futurofinternet]]></dc:creator>
		<pubDate>Mon, 11 Aug 2025 11:08:05 +0000</pubDate>
				<category><![CDATA[AI Agents & Privacy Reviews]]></category>
		<guid isPermaLink="false">https://futureofinternet.xyz/?p=1842</guid>

					<description><![CDATA[<p>Here is our independent evaluation of Qwen 3 by Alibaba, at the heart of the Web3 revolution and the quest for a sovereign and privacy-respecting AI. Based on an exclusive framework and a rigorous audit of publicly available data, this analysis reflects our vision of a future where privacy is a fundamental right. The scoring system [&#8230;]</p>
<p>L’article <a href="https://futureofinternet.xyz/ai-agents-privacy-reviews/qwen-3-privacy-data-review-2025/">Qwen 3 : Privacy and Data Review 2025</a> est apparu en premier sur <a href="https://futureofinternet.xyz">Future of Internet</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Here is our independent evaluation of <a href="https://chat.qwen.ai/" target="_blank" rel="noopener">Qwen 3 by Alibaba</a>,<strong> </strong>at the heart of the Web3 revolution and the quest for a sovereign and privacy-respecting AI. Based on an exclusive framework and a rigorous audit of publicly available data, this analysis reflects our vision of a future where privacy is a fundamental right.</p>
<p>The scoring system is based on a comprehensive guide created specifically for this project, accessible <a href="https://futureofinternet.xyz/ai-agents/ai-agents-privacy-data-rating-guide-2025/" target="_blank" rel="noopener">here</a>. This ranking is dynamic, evolving with innovations and feedback from the decentralized community.</p>
<p>Our mission: to enlighten and inform, without filter or influence, to build together a fairer and more transparent AI ecosystem.</p>
<p><em>update : 25/08/11</em></p>
<h2>Key Insights from the Qwen Privacy and Data Review</h2>
<h2>Model</h2>
<p>Qwen Chat (by Alibaba Cloud, Singapore Private Limited)</p>
<hr />
<h2>Data Collection</h2>
<p><strong>Prompts stored:</strong> As stated in Alibaba Cloud’s Privacy Policy (Section 5.2): “We may retain and use your input queries and responses to improve our AI models.” No short-term deletion guarantee. <span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3"><strong><strong style="color: #f97316;">C</strong></strong></span></span></p>
<p><strong>Use for training:</strong> Non-personal User Content may be used to improve models, but without clear anonymization safeguards. <span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3"><strong><strong style="color: #f97316;">C</strong></strong></span></span></p>
<p><strong>Account required: </strong>No mandatory registration; no personal info required. However, prompts and technical identifiers (e.g., IP) are collected regardless. Anonymity is partial. <span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3"><span style="color: #fbbf24;"><strong>B</strong></span></span></span></p>
<p><strong>Data retention duration:</strong> Retained as long as necessary or legally required. No maximum duration defined. Deletion/export rights exist only in certain jurisdictions (e.g., EEA, CCPA). <strong><strong style="color: #dc2626;">D</strong></strong></p>
<hr />
<h2>User Control</h2>
<p><strong>Deletion possible:</strong> Users can request deletion, but process varies by jurisdiction and is not immediate. <span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3"><span style="color: #fbbf24;"><strong>B</strong></span></span></span></p>
<p><strong>Export possible:</strong> Data portability rights apply in some regions, but export mechanisms and formats are unclear. <span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3"><strong><strong style="color: #f97316;">C</strong></strong></span></span></p>
<p><strong>Granularity control:</strong> No fine-grained settings for data collection or sharing. <strong><strong style="color: #dc2626;">D</strong></strong></p>
<p><strong>Explicit user consent:</strong> Consent is obtained via Terms and Privacy Policy, including deemed consent clauses. Withdrawal may limit service access. <span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3"><strong><strong style="color: #f97316;">C</strong></strong></span></span></p>
<hr />
<h2>Transparency</h2>
<p><strong>Clear policy:</strong> Detailed Privacy Policy and Terms are provided, covering data use and rights, but written in formal legal language. <span style="color: #4ade80;"><strong>A</strong></span></p>
<p><strong>Change notification:</strong> Updates published online or via email; users must actively monitor changes. <span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3"><span style="color: #fbbf24;"><strong>B</strong></span></span></span></p>
<p><strong>Model documentation</strong>: No public model cards, training data provenance, or evaluation reports. Lags behind OpenAI or Anthropic in transparency. <strong><strong style="color: #dc2626;">D</strong></strong></p>
<hr />
<h2>Privacy by Design</h2>
<p><strong>Encryption (core &amp; advanced):</strong> Encryption in transit and at rest claimed, but no public verification or advanced measures (e.g., homomorphic encryption) <span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3"><strong><strong style="color: #f97316;">C</strong></strong></span></span></p>
<p><strong>Privacy-Enhancing Technologies: </strong>No documented use of differential privacy, federated learning, or zero-knowledge proofs. <strong><strong style="color: #dc2626;">D</strong></strong></p>
<p><strong>Auditability &amp; Certification:</strong> No mention of third-party audits or certifications (e.g., SOC 2, ISO 27701). Encryption claims lack independent validation. <strong><strong style="color: #dc2626;">D</strong></strong></p>
<p><strong>Transparency &amp; Technical Documentation:</strong> No public details on privacy architecture or PETs implementation. <strong><strong style="color: #dc2626;">D</strong></strong></p>
<p><strong>User-Configurable Privacy Features</strong>: No adjustable privacy settings beyond consent withdrawal. <strong><strong style="color: #dc2626;">D</strong></strong></p>
<hr />
<h2>Hosting &amp; Sovereignty</h2>
<p><strong>Sovereignty:</strong> Hosted in Singapore, Indonesia, and/or China. Despite local hosting, Alibaba Cloud is subject to Chinese jurisdiction, where national security laws may override privacy protections. <span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3"><strong><strong style="color: #f97316;">C</strong></strong></span></span></p>
<p><strong>Legal jurisdiction:</strong> Governed by Singapore law; moderate privacy standards, weaker than EU’s. <span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3"><span style="color: #fbbf24;"><strong>B</strong></span></span></span></p>
<p><strong>Local option:</strong> No self-hosted or local deployment option available. <strong><strong style="color: #dc2626;">D</strong></strong></p>
<p><strong>Big Tech dependency:</strong> Runs on Alibaba Cloud infrastructure, no reliance on US-based Big Tech. <span style="color: #4ade80;"><strong>A</strong></span></p>
<hr />
<h2>Open Source</h2>
<p><strong>Publicly available model:</strong> The Qwen Chat service is fully proprietary. While some model weights (e.g., Qwen-7B) are released on Hugging Face under a non-commercial license, they are not equivalent to the production version.<em data-spm-anchor-id="a2ty_o01.29997173.0.i8.737bc921j6TPMO"> <strong><strong style="color: #dc2626;">D</strong></strong></em></p>
<p><strong>Clear open source license: </strong>No open-source license for the live service. Available weights are restricted and not production-ready. <strong><strong style="color: #dc2626;">D</strong></strong></p>
<p><strong>Inference code available:</strong> No inference code, training pipeline, or backend made public. Access only via hosted platform. <strong><strong style="color: #dc2626;">D</strong></strong></p>
<hr />
<h2>Remarks</h2>
<p>Qwen Chat grants Alibaba broad rights to store, use, and process user inputs for model improvement, with weak anonymization and indefinite retention. Users in certain regions have limited rights to deletion and data portability, but processes are not immediate or self-service. There is no transparency on model architecture, training data, or independent audits. While encryption is claimed, it lacks third-party verification, and no advanced PETs are used. Crucially, despite hosting in Singapore and Indonesia, the service remains under Chinese jurisdiction, a major sovereignty risk. The model is fully closed-source in production, with no local deployment option. Overall, Qwen Chat is a centralized, proprietary AI service operating under a moderately protective legal framework.</p>
<hr />
<div>
<div>
<h2>Privacy and Data Review: Overall Score</h2>
<p><strong><span class="dropcap">28.3/100</span></strong></p>
</div>
<p>&nbsp;</p>
<p>&nbsp;</p>
</div>
<div>
<ul>
<li>Data Collection: 5 + 5 + 15 + 0 = <strong data-start="81" data-end="87">25</strong></li>
<li>User Control: 15 + 5 + 0 + 5 = <strong data-start="121" data-end="127">25</strong></li>
<li>ransparency: 20 + 15 + 0 = <strong data-start="158" data-end="164">35</strong></li>
<li>Privacy by Design: 5 + 0 + 0 + 0 + 0 = <strong data-start="206" data-end="211">5</strong></li>
<li>Hosting &amp; Sovereignty: 5 + 15 + 0 + 20 = <strong data-start="255" data-end="261">40</strong></li>
<li>Open Source: 0 + 0 + 0 = <strong data-start="289" data-end="294">0</strong></li>
</ul>
<p data-start="331" data-end="377"><strong>Total: 25 + 25 + 35 + 5 + 40 + 0 = 130</strong></p>
<p data-start="379" data-end="409">23 × 20 = 460</p>
<p data-start="411" data-end="448"><strong>130 / 460 × 100 = 28.26</strong></p>
<div>
<hr />
<p data-pm-slice="1 1 []"><em>This evaluation is provided for informational purposes only and reflects a subjective analysis based on publicly available data at the time of publication. We do not guarantee absolute accuracy and disclaim all liability for errors or misinterpretations. Any disputes must be submitted in writing to <a href="mailto:futurofintenet@proton.me" target="_blank" rel="noopener">futurofintenet@proton.me</a></em></p>
<p data-pm-slice="1 1 []"><em>For full methodology, see our complete scoring guide here: <a href="https://futureofinternet.xyz/ai-agents-privacy-reviews/ai-agents-privacy-data-rating-guide-2025/">LLM Privacy Rating Guide</a></em></p>
</div>
</div>
<p>L’article <a href="https://futureofinternet.xyz/ai-agents-privacy-reviews/qwen-3-privacy-data-review-2025/">Qwen 3 : Privacy and Data Review 2025</a> est apparu en premier sur <a href="https://futureofinternet.xyz">Future of Internet</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Gemini 2.5 : Privacy and Data Review 2025</title>
		<link>https://futureofinternet.xyz/ai-agents-privacy-reviews/gemini-2-5-privacy-and-data-review-2025/</link>
		
		<dc:creator><![CDATA[futurofinternet]]></dc:creator>
		<pubDate>Sat, 09 Aug 2025 10:05:21 +0000</pubDate>
				<category><![CDATA[AI Agents & Privacy Reviews]]></category>
		<category><![CDATA[une]]></category>
		<guid isPermaLink="false">https://futureofinternet.xyz/?p=1186</guid>

					<description><![CDATA[<p>Here is our independent evaluation of Gemini 2.5 Flash by Google, at the heart of the Web3 revolution and the quest for a sovereign and privacy-respecting AI. Based on an exclusive framework and a rigorous audit of publicly available data, this analysis reflects our vision of a future where privacy is a fundamental right. The scoring [&#8230;]</p>
<p>L’article <a href="https://futureofinternet.xyz/ai-agents-privacy-reviews/gemini-2-5-privacy-and-data-review-2025/">Gemini 2.5 : Privacy and Data Review 2025</a> est apparu en premier sur <a href="https://futureofinternet.xyz">Future of Internet</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Here is our independent evaluation of <a href="https://gemini.google.com/" target="_blank" rel="noopener">Gemini 2.5 Flash by Google</a>,<strong> </strong>at the heart of the Web3 revolution and the quest for a sovereign and privacy-respecting AI. Based on an exclusive framework and a rigorous audit of publicly available data, this analysis reflects our vision of a future where privacy is a fundamental right.</p>
<p>The scoring system is based on a comprehensive guide created specifically for this project, accessible <a href="https://futureofinternet.xyz/ai-agents/ai-agents-privacy-data-rating-guide-2025/" target="_blank" rel="noopener">here</a>. This ranking is dynamic, evolving with innovations and feedback from the decentralized community.</p>
<p>Our mission: to enlighten and inform, without filter or influence, to build together a fairer and more transparent AI ecosystem.</p>
<p><em>update : 25/08/09</em></p>
<h2>Key Insights from the Gemini Privacy and Data Review</h2>
<h2>Model</h2>
<p><strong>Gemini 2.5 Flash</strong> / 2.5 Pro / AI Pro</p>
<hr />
<h2>Data Collection</h2>
<p><strong>Prompts stored:</strong> User prompts and interactions are stored by default if the user is 18 or older, with retention configurable (default 18 months, options for 3 or 36 months). If activity is disabled, data is kept up to 72 hours. Conversations reviewed by humans are retained up to 3 years. Data is dissociated from the account before human review. <span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3"><strong><strong style="color: #f97316;">C</strong></strong></span></span></p>
<p><strong>Use for training: </strong><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">Use</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">for</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">training:</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">User</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">prompts</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">are</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">used</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">for</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">model</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">improvement</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">and</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">training,</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">including</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">with</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">human</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">reviewers,</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">but</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">anonymization</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">measures</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">are</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">applied,</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">and</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">users</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">can</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">opt</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">out</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">of</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">most</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">data</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">use</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">by</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">disabling</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">activity</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">(though</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">comments</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">may</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">still</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">be</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">used).</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">This</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">offers</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">above-average</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">control</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">compared</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">to</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">similar</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">models.</span> <span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3"><span style="color: #fbbf24;"><strong>B</strong></span></span></span></span></p>
<p><strong>Account required:</strong> A Google account is required to use Gemini apps, and standard personal data is collected. No anonymous or accountless use described. <span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3"><strong><strong style="color: #f97316;">C</strong></strong></span></span></p>
<p><strong>Data retention duration:</strong> Data retention defaults to 18 months (user-configurable to 3 or 36 months). If activity is off, data is kept for 72 hours; reviewed conversations are kept up to 3 years. <span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3"><strong><strong style="color: #f97316;">C</strong></strong></span></span></p>
<hr />
<h2>User Control</h2>
<p><strong>Deletion possible: </strong>Deletion possible: Users can delete past conversations from their account, offering significant control, though data reviewed by humans is retained up to 3 years and not deleted when clearing activity. This is above average but not fully comprehensive. <span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3"><span style="color: #fbbf24;"><strong>B</strong></span></span></span></p>
<p><strong>Export possible: </strong>E<span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">xport possible: Users can export their data upon request, likely via Google Takeout, but details on formats (e.g., JSON, CSV) and completeness are not specified in the privacy guide. <span style="color: #fbbf24;"><strong>B</strong></span></span></span></p>
<p><strong>Granularity control:</strong> Users can configure the retention period (3, 18, 36 months) and enable/disable specific activity collection, but not fine-grained controls for all data types. <span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3"><span style="color: #fbbf24;"><strong>B</strong></span></span></span></p>
<p><strong>Explicit user consent:</strong> Consent is obtained for certain features (e.g., Voice Match), and users are informed about data use, but some consents are implicit or tied to general Google account terms. <span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3"><span style="color: #fbbf24;"><strong>B</strong></span></span></span></p>
<hr />
<h2>Transparency</h2>
<p><strong>Clear policy:</strong> A detailed and regularly updated privacy policy is available, with explicit explanations for most data processing. <span style="color: #4ade80;"><strong>A</strong></span></p>
<p><strong>Change notification:</strong> The policy states that users will be clearly notified if data use for ads changes, but does not specify proactive, advance notifications for all changes. <span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3"><span style="color: #fbbf24;"><strong>B</strong></span></span></span></p>
<p><strong>Model documentation:</strong> Limited information on model usage and legal bases is provided, with no public technical documentation on architecture, data, or security, which is below industry standards for transparency. <strong><strong style="color: #dc2626;">D</strong></strong></p>
<hr />
<h2>Privacy by Design</h2>
<p><strong>Encryption (core &amp; advanced): </strong>Standard encryption in transit and at rest is implemented, meeting industry expectations, though advanced encryption or public audits/certifications are not mentioned. <span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3"><span style="color: #fbbf24;"><strong>B</strong></span></span></span></p>
<p><strong>Privacy-Enhancing Technologies: </strong><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">Some anonymization and dissociation measures are described, but there is no mention of advanced privacy tech like differential privacy (e.g., as used by Apple) or federated learning. <strong><strong style="color: #f97316;">C</strong></strong></span></span></p>
<p><strong>Auditability &amp; Certification:</strong> No mention of third-party audits or certifications in the provided text. <strong><strong style="color: #dc2626;">D</strong></strong></p>
<p><strong>Transparency &amp; Technical Documentation:</strong> Privacy policy is detailed, but technical documentation is not described. <span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3"><strong><strong style="color: #f97316;">C</strong></strong></span></span></p>
<p><strong>User-Configurable Privacy Features:</strong> Some user controls for privacy (activity on/off, retention, deletion, audio opt-in), but not deeply configurable features (e.g., encryption levels, anonymization settings). <span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3"><strong><strong style="color: #f97316;">C</strong></strong></span></span></p>
<hr />
<h2>Hosting &amp; Sovereignty</h2>
<p><strong>Sovereignty:</strong> Data is hosted in Ireland (EU) for EEA and Switzerland, and in the USA elsewhere; no self-hosting or local deployment option mentioned. <span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3"><strong><strong style="color: #f97316;">C</strong></strong></span></span></p>
<p><strong>Legal jurisdiction:</strong> EU users are protected under EU law; other users are under US law. <span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3"><span style="color: #fbbf24;"><strong>B</strong></span></span></span></p>
<p><strong>Local option:</strong> No local or self-hosted option; Gemini is only available as a cloud service. <strong><strong style="color: #dc2626;">D</strong></strong></p>
<p><strong>Big Tech dependency:</strong> Fully dependent on Google Cloud and infrastructure, with no alternatives. <strong><strong style="color: #dc2626;">D</strong></strong></p>
<hr />
<h2>Open Source</h2>
<p><strong>Publicly available model:</strong> Gemini is fully proprietary; model and training data are not publicly available. <strong><strong style="color: #dc2626;">D</strong></strong></p>
<p><strong>Clear open source license:</strong> No open source license; the system is proprietary. <strong><strong style="color: #dc2626;">D</strong></strong></p>
<p><strong>Inference code available:</strong> No access to inference code; only API or web interfaces are offered. <strong><strong style="color: #dc2626;">D</strong></strong></p>
<hr />
<h2>Remarks</h2>
<div>
<div><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">The Gemini privacy guide provides substantial detail on data handling, user controls, and regional legal bases, with robust opt-outs and configurable retention settings. Users can delete most conversation data, and standard encryption is implemented. However, critical privacy protections (e.g., advanced encryption, privacy-enhancing technologies like differential privacy, third-party audits, self-hosting, or open-source availability) are absent or unspecified. Data reviewed by humans cannot be deleted, and technical model documentation is lacking. Compared to peers like ChatGPT (similar data retention) or Claude (minimal data use), Gemini offers strong transparency but falls short in technical openness and advanced privacy features. </span></span></div>
</div>
<div></div>
<div>
<hr />
</div>
<div>
<div>
<h2>Privacy and Data Review: Overall Score</h2>
<p><strong><span class="dropcap">38/100</span></strong></p>
</div>
<p>&nbsp;</p>
<p>&nbsp;</p>
</div>
<div>
<ul>
<li data-start="57" data-end="329">Data Collection: 5 + 15 + 5 + 5 = <strong data-start="121" data-end="127">30</strong></li>
<li data-start="57" data-end="329">User Control: 15 + 15 + 15 + 15 = <strong data-start="168" data-end="174">60</strong></li>
<li data-start="57" data-end="329">Transparency: 20 + 15 + 0 = <strong data-start="209" data-end="215">35</strong></li>
<li data-start="57" data-end="329">Privacy by Design: 15 + 5 + 0 + 5 + 5 = <strong data-start="262" data-end="268">30</strong></li>
<li data-start="57" data-end="329">Hosting &amp; Sovereignty: 5 + 15 + 0 + 0 = <strong data-start="315" data-end="321">20</strong></li>
<li data-start="57" data-end="329">Open Source: 0 + 0 + 0 = <strong data-start="353" data-end="358">0</strong></li>
</ul>
<p data-start="331" data-end="377"><strong>Total: 30 + 60 + 35 + 30 + 20 + 0 = 175</strong></p>
<p data-start="379" data-end="409">23 × 20 = 460</p>
<p data-start="411" data-end="448"><strong>175 / 460 × 100 = 38</strong></p>
<div>
<hr />
<p data-pm-slice="1 1 []"><em>This evaluation is provided for informational purposes only and reflects a subjective analysis based on publicly available data at the time of publication. We do not guarantee absolute accuracy and disclaim all liability for errors or misinterpretations. Any disputes must be submitted in writing to <a href="mailto:futurofintenet@proton.me" target="_blank" rel="noopener">futurofintenet@proton.me</a></em></p>
<p data-pm-slice="1 1 []"><em>For full methodology, see our complete scoring guide here: <a href="https://futureofinternet.xyz/ai-agents-privacy-reviews/ai-agents-privacy-data-rating-guide-2025/">LLM Privacy Rating Guide</a></em></p>
</div>
</div>
<p>L’article <a href="https://futureofinternet.xyz/ai-agents-privacy-reviews/gemini-2-5-privacy-and-data-review-2025/">Gemini 2.5 : Privacy and Data Review 2025</a> est apparu en premier sur <a href="https://futureofinternet.xyz">Future of Internet</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>DeepSeek V3 : Privacy and Data Review 2025</title>
		<link>https://futureofinternet.xyz/ai-agents-privacy-reviews/deepseek-privacy-review-2025/</link>
		
		<dc:creator><![CDATA[futurofinternet]]></dc:creator>
		<pubDate>Fri, 08 Aug 2025 10:19:33 +0000</pubDate>
				<category><![CDATA[AI Agents & Privacy Reviews]]></category>
		<category><![CDATA[une]]></category>
		<guid isPermaLink="false">https://futureofinternet.xyz/?p=1188</guid>

					<description><![CDATA[<p>Here is our independent evaluation of Deepseek V3, at the heart of the Web3 revolution and the quest for a sovereign and privacy-respecting AI. Based on an exclusive framework and a rigorous audit of publicly available data, this analysis reflects our vision of a future where privacy is a fundamental right. The scoring system is based [&#8230;]</p>
<p>L’article <a href="https://futureofinternet.xyz/ai-agents-privacy-reviews/deepseek-privacy-review-2025/">DeepSeek V3 : Privacy and Data Review 2025</a> est apparu en premier sur <a href="https://futureofinternet.xyz">Future of Internet</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Here is our independent evaluation of <a href="https://chat.deepseek.com/" target="_blank" rel="noopener">Deepseek V3</a>,<strong> </strong>at the heart of the Web3 revolution and the quest for a sovereign and privacy-respecting AI. Based on an exclusive framework and a rigorous audit of publicly available data, this analysis reflects our vision of a future where privacy is a fundamental right.</p>
<p>The scoring system is based on a comprehensive guide created specifically for this project, accessible <a href="https://futureofinternet.xyz/ai-agents/ai-agents-privacy-data-rating-guide-2025/" target="_blank" rel="noopener">here</a>. This ranking is dynamic, evolving with innovations and feedback from the decentralized community.</p>
<p>Our mission: to enlighten and inform, without filter or influence, to build together a fairer and more transparent AI ecosystem.</p>
<p><em>update : 25/08/08</em></p>
<h2>Key Insights from the Deepseek Privacy and Data Review</h2>
<h2>Model</h2>
<div>
<div>DeepSeek-V3, an advanced proprietary large language model, optimizes contextual understanding and privacy but lacks public architectural details, limiting transparency.</div>
</div>
<div></div>
<div>
<hr />
</div>
<h2>Data Collection</h2>
<p><strong>Prompts stored: </strong><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">User</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">inputs</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">and</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">chat</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">history</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">are</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">retained</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">to</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">support</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">service</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">functionality</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">and</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">model</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">enhancement.</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">An</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">opt-out</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">mechanism</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">(“Improve</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">the</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">model</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">for</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">everyone”)</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">is</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">available,</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">but</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">no</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">automatic</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">deletion</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">policy</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">exists;</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">data</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">is</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">retained</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">based</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">on</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">account</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">or</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">business</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">requirements. <strong><strong style="color: #f97316;">C</strong></strong></span></span></p>
<p><strong>Use for training: </strong><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">Access requires mandatory account creation (email, username, etc.), with no anonymous access. Opt-out for training is available, but enforcement and scope of data use are unclear. <strong><strong style="color: #f97316;">C</strong></strong></span></span></p>
<p><strong>Account required:</strong> Account is required to use the service, and personal information like email, username, and date of birth may be collected, but no sensitive data is required by default. No anonymous access option mentioned. <strong><strong style="color: #f97316;">C</strong></strong></p>
<p><strong>Data retention duration:</strong>Data is stored indefinitely unless the user initiates account deletion. No fixed retention limits are specified, raising concerns about prolonged data storage. <strong><strong style="color: #dc2626;">D</strong></strong></p>
<hr />
<h2>User Control</h2>
<p><strong>Deletion possible:</strong>Users can delete their account and chat history via the platform interface. However, DeepSeek may retain certain data for legal compliance or to address violations, with no guaranteed immediate or unconditional deletion (no Service Level Agreement on deletion timelines). <span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3"><span style="color: #fbbf24;"><strong>B</strong></span></span></span></p>
<p><strong>Export possible: </strong>Data export requires manual requests through support channels, lacking self-service functionality, which falls short of GDPR’s emphasis on accessible data portability. <strong><strong style="color: #f97316;">C</strong></strong></p>
<p><strong>Granularity control: </strong>Users can opt out of model improvement and manage limited personal data (e.g., chat history). However, fine-grained control over all data types is not explicitly supported. <span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3"><span style="color: #fbbf24;"><strong>B</strong></span></span></span></p>
<p><strong>Explicit user consent: </strong>For EU/UK users, GDPR-compliant consent is obtained for specific data processing, with clear information and options to withdraw consent, aligning with regulatory standards. <span style="color: #4ade80;"><strong>A</strong></span></p>
<hr />
<h2>Transparency</h2>
<p><strong>Clear policy:</strong> The privacy policy is comprehensive, accessible, and regularly updated, meeting high standards for clarity and user awareness. <span style="color: #4ade80;"><strong>A</strong></span></p>
<p><strong>Change notification:</strong>Policy updates are communicated retroactively, lacking proactive user notification mechanisms. <strong><strong style="color: #f97316;">C</strong></strong></p>
<p><strong>Model documentation: </strong><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">Limited references to model architecture are available but lack detailed public documentation, reducing transparency. <strong><strong style="color: #f97316;">C</strong></strong></span></span></p>
<hr />
<h2>Privacy by Design</h2>
<p><strong>Encryption (core &amp; advanced): </strong>DeepSeek claims to implement “security measures” but provides no specifics on end-to-end or at-rest encryption protocols, raising concerns about data protection rigor. <strong><strong style="color: #dc2626;">D</strong></strong></p>
<p><strong>Privacy-Enhancing Technologies: </strong>Claims of data de-identification are noted, but no evidence of advanced PETs (e.g., differential privacy) or verifiable proofs is provided. <strong><strong style="color: #dc2626;">D</strong></strong></p>
<p><strong>Auditability &amp; Certification: </strong>A GDPR representative (Prighter) is appointed, but no third-party audits or certifications are disclosed. <strong><strong style="color: #dc2626;">D</strong></strong></p>
<p><strong>Transparency &amp; Technical Documentation: </strong>No detailed technical documentation on security measures or model architecture is available, limiting independent verification. <strong><strong style="color: #dc2626;">D</strong></strong></p>
<p><strong>User-Configurable Privacy Features: </strong>Only basic opt-out options are provided, with no advanced privacy customization features. <strong><strong style="color: #f97316;">C</strong></strong></p>
<hr />
<h2>Hosting &amp; Sovereignty</h2>
<p><strong>Sovereignty:</strong> All user data is processed and stored in the People’s Republic of China, with no mention of self-hosting or alternative sovereign hosting. <strong><strong style="color: #dc2626;">D</strong></strong></p>
<p><strong>Legal jurisdiction:</strong> The legal jurisdiction is the People’s Republic of China, which does not provide strong data protection guarantees. <strong><strong style="color: #dc2626;">D</strong></strong></p>
<p><strong>Local option: </strong>No local or self-hosting options are available; the service is entirely cloud-based in China. <strong><strong style="color: #dc2626;">D</strong></strong></p>
<p><strong>Big Tech dependency: </strong>No explicit reliance on major US tech providers is noted. As a China-based entity with internal infrastructure, dependency is likely minimal. <span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3"><span style="color: #fbbf24;"><strong>B</strong></span></span></span></p>
<hr />
<h2>Open Source</h2>
<p><strong>Publicly available model:</strong> No indication that the model or training data is open source or publicly available. <strong><strong style="color: #dc2626;">D</strong></strong></p>
<p><strong>Clear open source license:</strong> No open source license provided or referenced. <strong><strong style="color: #dc2626;">D</strong></strong></p>
<p><strong>Inference code available:</strong> No mention of accessible inference code; API access only. <strong><strong style="color: #dc2626;">D</strong></strong></p>
<hr />
<h2>Remarks</h2>
<div>DeepSeek’s privacy policy is transparent and GDPR-compliant for EU/UK users, offering clear consent mechanisms and basic user controls (e.g., deletion, opt-out for model improvement). However, significant concerns arise from data processing and storage exclusively in China, subjecting user data to a jurisdiction with limited data protection guarantees. The absence of advanced privacy by design (e.g., encryption specifics, PETs, audits), local hosting options, and open source elements further weakens its privacy posture. <span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">While opt-out mechanisms exist, indefinite data retention, lack of proactive policy change notifications, </span></span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-b88u0q r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274">and absence of anonymous access options</span></span></span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3"> are notable drawbacks.</span></span></div>
<div></div>
<hr />
<div>
<div>
<h2>Privacy and Data Review: Overall Score</h2>
<p><strong><span class="dropcap">26/100</span></strong></p>
</div>
<p>&nbsp;</p>
<p>&nbsp;</p>
</div>
<div>
<ul>
<li data-start="57" data-end="329">Data Collection: 5 + 5 + 5 + 0 = <strong data-start="94" data-end="100">15</strong></li>
<li data-start="57" data-end="329">User Control: 15 + 5 + 15 + 20 = <strong data-start="140" data-end="146">55</strong></li>
<li data-start="57" data-end="329">Transparency: 20 + 5 + 5 = <strong data-start="180" data-end="186">30</strong></li>
<li data-start="57" data-end="329">Privacy by Design: 0 + 0 + 0 + 0 + 5 = <strong data-start="232" data-end="237">5</strong></li>
<li data-start="57" data-end="329">Hosting &amp; Sovereignty: 0 + 0 + 0 + 15 = <strong data-start="284" data-end="290">15</strong></li>
<li data-start="57" data-end="329">Open Source: 0 + 0 + 0 = <strong data-start="322" data-end="327">0</strong></li>
</ul>
<p data-start="331" data-end="377"><strong>Total: 15 + 55 + 30 + 5 + 15 + 0 = 120</strong></p>
<p data-start="379" data-end="409">23 × 20 = 460</p>
<p data-start="411" data-end="448"><strong>120 / 460 × 100 = 26</strong></p>
<div>
<hr />
<p data-pm-slice="1 1 []"><em>This evaluation is provided for informational purposes only and reflects a subjective analysis based on publicly available data at the time of publication. We do not guarantee absolute accuracy and disclaim all liability for errors or misinterpretations. Any disputes must be submitted in writing to <a href="mailto:futurofintenet@proton.me" target="_blank" rel="noopener">futurofintenet@proton.me</a></em></p>
<p data-pm-slice="1 1 []"><em>For full methodology, see our complete scoring guide here: <a href="https://futureofinternet.xyz/ai-agents/ai-agents-privacy-data-rating-guide-2025/">LLM Privacy Rating Guide</a></em></p>
</div>
</div>
<p>L’article <a href="https://futureofinternet.xyz/ai-agents-privacy-reviews/deepseek-privacy-review-2025/">DeepSeek V3 : Privacy and Data Review 2025</a> est apparu en premier sur <a href="https://futureofinternet.xyz">Future of Internet</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Llama 4 : Privacy and Data Review 2025</title>
		<link>https://futureofinternet.xyz/ai-agents-privacy-reviews/llama-4-meta-ai-privacy-review/</link>
		
		<dc:creator><![CDATA[futurofinternet]]></dc:creator>
		<pubDate>Thu, 07 Aug 2025 07:55:15 +0000</pubDate>
				<category><![CDATA[AI Agents & Privacy Reviews]]></category>
		<guid isPermaLink="false">https://futureofinternet.xyz/?p=1200</guid>

					<description><![CDATA[<p>Here is our independent evaluation of Llama 4 (Meta), at the heart of the Web3 revolution and the quest for a sovereign and privacy-respecting AI. Based on an exclusive framework and a rigorous audit of publicly available data, this analysis reflects our vision of a future where privacy is a fundamental right. The scoring system [&#8230;]</p>
<p>L’article <a href="https://futureofinternet.xyz/ai-agents-privacy-reviews/llama-4-meta-ai-privacy-review/">Llama 4 : Privacy and Data Review 2025</a> est apparu en premier sur <a href="https://futureofinternet.xyz">Future of Internet</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Here is our independent evaluation of <strong><a href="https://www.llama.com/" target="_blank" rel="noopener">Llama 4 (Meta),</a> </strong>at the heart of the Web3 revolution and the quest for a sovereign and privacy-respecting AI. Based on an exclusive framework and a rigorous audit of publicly available data, this analysis reflects our vision of a future where privacy is a fundamental right.</p>
<p>The scoring system is based on a comprehensive guide created specifically for this project, accessible <a href="https://futureofinternet.xyz/ai-agents/ai-agents-privacy-data-rating-guide-2025/" target="_blank" rel="noopener">here</a>. This ranking is dynamic, evolving with innovations and feedback from the decentralized community.</p>
<p>Our mission: to enlighten and inform, without filter or influence, to build together a fairer and more transparent AI ecosystem.</p>
<p><em>update : 25/08/07</em></p>
<h2>Key Insights from the Llama Privacy and Data Review</h2>
<h2>Model</h2>
<div><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">Meta’s</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">Llama</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">4</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">variants</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">(Scout,</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">Maverick,</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">Behemoth)</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">feature</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">documented</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">architectures</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">(Mixture-of-Experts,</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">early</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">fusion</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">multimodality),</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">sizes</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">up</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">to</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">1.9T</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">parameters,</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">and</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">training</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">on</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">30T</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">tokens</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">(text,</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">image,</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">video).</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">Technical</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">whitepapers</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">and</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">model</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">cards</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">provide</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">some</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">transparency,</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">but</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">details</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">on</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">training</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">data</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">provenance,</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">bias</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">mitigation,</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">and</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">security</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">audits</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">are</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">incomplete.</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">While</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">Meta’s</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">openness</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">about</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">architecture</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">is</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">a</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">significant</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">step,</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">the</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">lack</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">of</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">specifics</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">on</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">data</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">sources</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">(e.g.,</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">public</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">or</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">licensed</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">datasets),</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">bias</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">testing,</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">and</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">independent</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">audits</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">limits</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">reproducibility</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">and</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">trust.</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">Full</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">datasheets</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">and</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">third-party</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">audit</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">results</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">would</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">set</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">a</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">new</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">industry</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">standard.</span></span></div>
<div></div>
<div>
<hr />
</div>
<h2>Data Collection</h2>
<p><strong>Prompts stored: </strong><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">Prompts</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">and</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">responses</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">are</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">not</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">stored</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">beyond</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">the</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">session,</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">a</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">strong</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">privacy</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">feature.</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">However,</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">other</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">user</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">data</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">(e.g.,</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">identity,</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">device</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">info,</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">usage</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">patterns)</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">may</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">be</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">retained</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">without</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">clear</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">anonymization</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">or</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">deletion</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">policies,</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">posing</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">privacy</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">risks.</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">Meta</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">should</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">guarantee</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">no</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">persistent</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">prompt</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">storage,</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">anonymize</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">all</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">prompts</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">by</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">default,</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">and</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">define</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">clear</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">retention</span> </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274 r-nhe8su r-yn5ncy r-clrlgt r-1ftll1t"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">periods. <strong><strong style="color: #f97316;">C</strong></strong></span></span></p>
<p><strong>Use for training: </strong>User data, even if anonymized, may be used to improve Llama 4, with no clear opt-out for standard users (self-hosting excepted). This lack of control and transparency over data use is concerning. A technical opt-out mechanism is needed. <strong><strong style="color: #f97316;">C</strong></strong></p>
<p><strong>Account required: </strong>Personalized use requires an account with standard personal data collection. Anonymous use is limited to self-hosting, which is only feasible for technical users. Most users must share personal information. <strong><strong style="color: #f97316;">C</strong></strong></p>
<p><strong>Data retention duration: </strong>User data is retained “as long as needed” for service or legal purposes, with no specific deletion timeline except for cookies (up to 400 days). This vagueness creates uncertainty. Meta should specify exact retention periods for all data types. <strong><strong style="color: #f97316;">C</strong></strong></p>
<div>
<hr />
</div>
<h2>User Control</h2>
<p><strong>Deletion possible: </strong>Account data can be deleted under GDPR, but the process may not be immediate or complete due to legal retention requirements. Full user control requires instant, total deletion by default. <strong><strong style="color: #f97316;">C</strong></strong></p>
<div></div>
<p><strong>Export possible: </strong>GDPR-compliant data export is available, but the format and completeness are unclear. Standardized, usable formats (e.g., JSON, CSV) would enhance portability. <span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3"><span style="color: #fbbf24;"><strong>B</strong></span></span></span></p>
<p><strong>Granularity control: </strong>Basic privacy settings are available, but fine-grained controls (e.g., per-prompt or per-interaction) are absent. Granular dashboards would empower users. <strong><strong style="color: #f97316;">C</strong></strong></p>
<p><strong>Explicit user consent: </strong>Explicit consent for sensitive data and ads is GDPR-compliant and revocable, a strong transparency feature. <span style="color: #4ade80;"><strong>A</strong></span></p>
<hr />
<h2>Transparency</h2>
<p><strong>Clear policy: </strong>Meta’s privacy policy is detailed, readable, and regularly updated, clearly outlining data practices. <span style="color: #4ade80;"><strong>A</strong></span></p>
<p><strong>Change notification: </strong>Users are notified in advance of major policy changes and can review them, a key transparency practice. <span style="color: #4ade80;"><strong>A</strong></span></p>
<p><strong>Model documentation: </strong>Only high-level information on architecture, security, and data is provided, lacking detailed technical documentation. Full disclosure is needed for accountability. <strong><strong style="color: #f97316;">C</strong></strong></p>
<hr />
<h2>Privacy by Design</h2>
<p><strong>Encryption (core &amp; advanced): </strong>Security is mentioned, but specifics on encryption methods (e.g., end-to-end) or certifications are absent, undermining trust. <strong><strong style="color: #f97316;">C</strong></strong></p>
<div><strong><strong>Privacy-Enhancing Technologies : </strong></strong><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">Llama 4 employs </span></span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-b88u0q r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274">differential privacy</span></span></span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3"> with noise injection (likely ε ≤ 1) during training and supports </span></span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-b88u0q r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274">on-device inference</span></span></span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3"> with Int4 quantization for local deployment, earning a <span style="color: #fbbf24;"><strong>B</strong></span></span></span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3"> rating due to strong privacy protections but risks from open-source weight distribution and limited training data transparency. Local fine-tuning and secure aggregation further enhance privacy for sensitive applications.</span></span></div>
<div></div>
<p><strong>Auditability &amp; Certification: </strong>No evidence of independent audits is provided. Regular, public audits would enhance transparency. <strong><strong style="color: #dc2626;">D</strong></strong></p>
<p><strong>Transparency &amp; Technical Documentation:</strong> No advanced technical documentation on privacy or architecture, only high-level information. You can’t really see “under the hood” of Llama 4’s privacy protections. Full technical disclosure is needed for experts and users alike. <strong><strong style="color: #f97316;">C</strong></strong></p>
<p><strong>User-Configurable Privacy Features: </strong>Basic privacy controls exist, but advanced customization (e.g., custom retention periods, prompt-level controls) is lacking. More flexible options would strengthen user control. <strong><strong style="color: #f97316;">C</strong></strong></p>
<hr />
<h2>Hosting &amp; Sovereignty</h2>
<p><strong>Sovereignty: </strong>Self-hosting allows enterprises and advanced users to control data on their servers, a major privacy advantage. Non-technical users rely on Meta’s GDPR-compliant EU cloud, which is less flexible. <span style="color: #4ade80;"><strong>A</strong></span></p>
<p><strong>Legal jurisdiction: </strong>Meta-hosted data falls under EU/Irish GDPR laws; self-hosted data follows local laws. Both offer strong legal protections. <span style="color: #4ade80;"><strong>A</strong></span></p>
<p><strong>Local option: </strong>Self-hosting is available for enterprises and experts, but regular users are limited to Meta’s cloud. A local option for all users would improve flexibility. <span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3"><span style="color: #fbbf24;"><strong>B</strong></span></span></span></p>
<p><strong>Big Tech dependency: </strong>Cloud users are tied to Meta’s infrastructure, while self-hosting offers independence but requires technical expertise. <strong><strong style="color: #f97316;">C</strong></strong></p>
<hr />
<h2>Open Source</h2>
<p><strong>Publicly available model: </strong>Llama 4’s weights are downloadable but come with usage restrictions, falling short of true open-source freedoms. No access to training data or full code is provided, limiting adaptability. <span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3"><span style="color: #fbbf24;"><strong>B</strong></span></span></span></p>
<p><strong>Clear open source license: </strong>The custom “open weights” license restricts full open-source freedoms (e.g., sharing, modification). An OSI-approved license (e.g., MIT, Apache) would boost trust and innovation. <strong><strong style="color: #f97316;">C</strong></strong></p>
<p><strong>Inference code available: </strong>Providing inference code enables self-hosting, a significant win for transparency and control, though primarily for technical users. <span style="color: #4ade80;"><strong>A</strong></span></p>
<hr />
<h2>Remarks</h2>
<div>Llama 4 advances open, sovereign AI with accessible model weights, self-hosting options, and session-only prompt storage. However, incomplete details on training data, bias mitigation, security audits, and open-source licensing limit trust. To set a privacy and trust benchmark, Meta must provide detailed technical documentation, adopt true open-source licensing, conduct regular public audits, and offer robust user controls, especially for non-technical users.</div>
<div></div>
<div>
<hr />
</div>
<div>
<div>
<h2>Privacy and Data Review: Overall Score</h2>
<p><strong><span class="dropcap">52.2/100</span></strong></p>
</div>
<p>&nbsp;</p>
<p>&nbsp;</p>
</div>
<div>
<ul>
<li data-start="1037" data-end="1077">Data Collection : 5 + 5 + 5 + 5 = <strong data-start="1071" data-end="1077">20</strong></li>
<li data-start="1080" data-end="1119">User Control : 5 + 15 + 5 + 20 = <strong data-start="1113" data-end="1119">45</strong></li>
<li data-start="1122" data-end="1157">Transparency : 20 + 20 + 5 = <strong data-start="1151" data-end="1157">45</strong></li>
<li data-start="1160" data-end="1202">Privacy by Design : 5 + 15 + 0 + 5 + 5 = 30</li>
<li data-start="1205" data-end="1254">Hosting &amp; Sovereignty : 20 + 20 + 15 + 5 = <strong data-start="1248" data-end="1254">60</strong></li>
<li data-start="1257" data-end="1291">Open Source : 15 + 5 + 20 = <strong data-start="1285" data-end="1291">40</strong></li>
</ul>
<p data-start="1293" data-end="1345"><strong data-start="1293" data-end="1345">Total : 20 + 45 + 45 + 15 + 60 + 40 = 240</strong></p>
<p data-start="1293" data-end="1345">23 x 20 = 460</p>
<p data-start="1293" data-end="1345"><strong>240 / 460 × 100 = 52.2</strong></p>
<div>
<hr />
<p data-pm-slice="1 1 []"><em>This evaluation is provided for informational purposes only and reflects a subjective analysis based on publicly available data at the time of publication. We do not guarantee absolute accuracy and disclaim all liability for errors or misinterpretations. Any disputes must be submitted in writing to <a href="mailto:futurofintenet@proton.me" target="_blank" rel="noopener">futurofintenet@proton.me</a></em></p>
<p data-pm-slice="1 1 []"><em>For full methodology, see our complete scoring guide here: <a href="https://futureofinternet.xyz/ai-agents/ai-agents-privacy-data-rating-guide-2025/">LLM Privacy Rating Guide</a></em></p>
</div>
</div>
<p>L’article <a href="https://futureofinternet.xyz/ai-agents-privacy-reviews/llama-4-meta-ai-privacy-review/">Llama 4 : Privacy and Data Review 2025</a> est apparu en premier sur <a href="https://futureofinternet.xyz">Future of Internet</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Mistral AI : Privacy and Data Review 2025</title>
		<link>https://futureofinternet.xyz/ai-agents-privacy-reviews/mistral-ai-privacy-and-data-review-2025/</link>
		
		<dc:creator><![CDATA[futurofinternet]]></dc:creator>
		<pubDate>Wed, 06 Aug 2025 13:06:15 +0000</pubDate>
				<category><![CDATA[AI Agents & Privacy Reviews]]></category>
		<guid isPermaLink="false">https://futureofinternet.xyz/?p=1190</guid>

					<description><![CDATA[<p>Here is our independent evaluation of Le Chat (Mistral AI), at the heart of the Web3 revolution and the quest for a sovereign and privacy-respecting AI. Based on an exclusive framework and a rigorous audit of publicly available data, this analysis reflects our vision of a future where privacy is a fundamental right. The scoring [&#8230;]</p>
<p>L’article <a href="https://futureofinternet.xyz/ai-agents-privacy-reviews/mistral-ai-privacy-and-data-review-2025/">Mistral AI : Privacy and Data Review 2025</a> est apparu en premier sur <a href="https://futureofinternet.xyz">Future of Internet</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Here is our independent evaluation of <strong><a href="https://chat.mistral.ai/" target="_blank" rel="noopener">Le Chat (Mistral AI),</a> </strong>at the heart of the Web3 revolution and the quest for a sovereign and privacy-respecting AI. Based on an exclusive framework and a rigorous audit of publicly available data, this analysis reflects our vision of a future where privacy is a fundamental right.</p>
<p>The scoring system is based on a comprehensive guide created specifically for this project, accessible <a href="https://futureofinternet.xyz/ai-agents/ai-agents-privacy-data-rating-guide-2025/" target="_blank" rel="noopener">here</a>. This ranking is dynamic, evolving with innovations and feedback from the decentralized community.</p>
<p>Our mission: to enlighten and inform, without filter or influence, to build together a fairer and more transparent AI ecosystem.</p>
<p><em>update : 25/09/21</em></p>
<h2>Key Insights from the Mistral Privacy and Data Review</h2>
<h2>Model</h2>
<ul>
<li>Premier Models: Codestral 25.08, Voxtral Mini Transcribe, Mistral OCR 25.05, Ministral 3B, Ministral 8B, Codestral 25.01, Mistral Large 2, Pixtral Large, Mistral Small 2, Mistral Embed, Codestral Embed, Mistral Moderation.</li>
<li>Open Models: Voxtral Small, Voxtral Mini, Mistral Small 3.2, Mistral Small 3.1, Mistral Small 3, Codestral Mamba, Pixtral 12B, Mistral Nemo 12B, Mathstral 7B, Mixtral 8x7B, Mistral 7B.</li>
</ul>
<hr />
<h2>Data Collection</h2>
<p><strong>Prompts stored: </strong><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">Mistral AI provides clear and transparent practices for data storage, with Le Chat inputs retained until user deletion (or zero retention activation) and API data stored for 30 days unless zero retention is enabled. Fine-Tuning and Agents API data retention is also clearly defined. The availability of zero data retention and alignment with GDPR standards justify an <span style="color: #4ade80;"><strong>A</strong></span></span></span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3"> rating, as these practices demonstrate a strong commitment to user privacy and data minimization.</span></span></p>
<p><strong>Use for training: </strong><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">Users can opt out of data use for training, and Le Chat Pro is excluded from training by default unless users opt in, which is a best-in-class approach. Feedback mechanisms (e.g., &#8220;thumbs up/down&#8221;) are also opt-out, ensuring user control. This robust, user-centric approach to training data usage, combined with clear opt-out options, warrants an <span style="color: #4ade80;"><strong>A</strong></span></span></span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3"> rating for exceeding standard expectations</span></span></p>
<p><strong>Account required: </strong>An account is required for La Plateforme and certain endpoints, typically involving an email or phone number. Standard API key registration is available for broader access. <strong><strong style="color: #f97316;">C</strong></strong></p>
<p><strong>Data retention duration: </strong><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">Mistral clearly outlines retention periods: Le Chat data is kept until deletion, API data for 30 days (unless zero retention is activated), Fine-Tuning/Agents API data until account termination, and civil identity data for 5 years post-termination. While the long retention of civil identity data slightly impacts the score, the transparency and GDPR compliance, along with zero retention options, support a <span style="color: #fbbf24;"><strong>B</strong></span></span></span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3"> rating, reflecting a strong but not perfect policy.</span></span></p>
<hr />
<h2>User Control</h2>
<p><strong>Deletion possible: </strong><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">Mistral offers multiple clear channels for data deletion, including account settings, a &#8220;Privacy Requests&#8221; form, and direct contact with the Privacy Team at support@mistral.ai. These accessible and user-friendly mechanisms align with GDPR requirements and demonstrate a strong commitment to user control, justifying an <span style="color: #4ade80;"><strong>A</strong></span></span></span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3"> rating for robust deletion processes.</span></span></p>
<p><strong>Export possible:</strong> There is no explicit mention of data export options for users. This would typically be detailed in the user agreement or privacy policy. <strong><strong style="color: #dc2626;">D</strong></strong></p>
<p><strong>Granularity control: </strong><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">Limited granularity control is available, primarily through opt-in/opt-out for training and zero data retention requests. Free users can object to data processing via email, the Help Center, or letter, though Pro users have easier in-interface controls (e.g., two-click opt-out). <span style="color: #fbbf24;"><strong>B</strong></span></span></span></p>
<p><strong>Explicit user consent: </strong>Consent is implied via acceptance of Terms of Service and Privacy Policy. Explicit consent is required for non-essential cookies and certain training opt-ins. Free users’ right to object was added post-GDPR complaint in February 2025, ensuring compliance. <span style="color: #fbbf24;"><strong>B</strong></span></p>
<hr />
<h2>Transparency</h2>
<p><strong>Clear policy: </strong>Mistral AI provides a Privacy Policy and Terms of Service, accessible via their website and Help Center. Specifics are detailed in these documents, though not always in public-facing extracts. <span style="color: #fbbf24;"><strong>B</strong></span></p>
<p><strong>Change notification: </strong>No explicit proactive notification process for policy changes is mentioned; users are advised to check the Privacy Policy regularly for updates. <strong><strong style="color: #dc2626;">D</strong></strong></p>
<p><strong>Model documentation: </strong><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">Extensive technical documentation is available for models, endpoints, and deployment (e.g., La Plateforme, Mistral OCR), ensuring high transparency for technical offerings. <span style="color: #4ade80;"><strong>A</strong></span></span></span></p>
<hr />
<h2>Privacy by Design</h2>
<p><strong>Encryption (core &amp; advanced): </strong>Mistral AI employs end-to-end encryption for data in transit and at rest, with AES-256 used at the disk level for secure storage, ensuring robust data protection. <span style="color: #4ade80;"><strong>A</strong></span></p>
<div><strong>Privacy-Enhancing Technologies :</strong> <span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">Mistral AI’s Le Chat employs </span></span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-b88u0q r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274">AES-256/TLS 1.3 encryption</span></span></span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3"> for data security and offers </span></span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-b88u0q r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274">private deployment options</span></span></span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3"> with GDPR-compliant infrastructure, earning a </span></span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-b88u0q r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274">B</span></span></span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3"> rating due to strong privacy controls but potential risks from third-party content integration and limited transparency on training data. Users can opt out of data usage for model training, and data is retained only as needed (e.g., 30 days for abuse monitoring), enhancing privacy for sensitive use cases. <span style="color: #fbbf24;"><strong>B</strong></span></span></span></div>
<div></div>
<p><strong>Auditability &amp; Certification: </strong>Certified under ISO 27001/9001/14001/50001 and ANSSI II-901, with regular audits to maintain high security and compliance standards. <span style="color: #4ade80;"><strong>A</strong></span></p>
<p><strong>Transparency &amp; Technical Documentation: </strong><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">Extensive technical documentation exists for models and deployment, but privacy-specific measures (e.g., data processing details) are less comprehensive, rated as partial. <span style="color: #fbbf24;"><strong>B</strong></span></span></span></p>
<p><strong>User-Configurable Privacy Features: </strong>Privacy features are limited to global controls such as zero data retention and training opt-out. No fine-grained settings are available. <span style="color: #fbbf24;"><b>C</b></span></p>
<hr />
<h2>Hosting &amp; Sovereignty</h2>
<p><strong>Sovereignty:</strong> Mistral AI is hosted in EU tier-3+ data centers, providing options for sovereign and private hosting. This ensures compliance with EU data protection regulations and enhances data sovereignty. <span style="color: #4ade80;"><strong>A</strong></span></p>
<p><strong>Legal jurisdiction:</strong> Mistral AI operates under EU legal jurisdiction, which is known for strong data protection laws. This provides an additional layer of legal protection for user data. <span style="color: #4ade80;"><strong>A</strong></span></p>
<p><strong>Local option:</strong> Mistral AI models can be self-hosted, allowing for local deployment and greater control over data. This is ideal for organizations with stringent data privacy requirements. <span style="color: #4ade80;"><strong>A</strong></span></p>
<p><strong>Big Tech dependence:</strong> While some endpoints are available via Big Tech clouds (Azure, AWS, GCP), Mistral AI offers sovereign and self-hosting options, reducing dependence on Big Tech infrastructure. <span style="color: #fbbf24;"><strong>B</strong></span></p>
<hr />
<h2>Open Source</h2>
<p><strong>Publicly available model:</strong> Many of Mistral AI&#8217;s models are fully open source, including weights, code, and training data. This promotes transparency and community collaboration. <span style="color: #4ade80;"><strong>A</strong></span></p>
<p><strong>Clear open source license:</strong> Mistral AI models are released under Apache 2.0 or Mistral Research License, providing clear guidelines for use and modification. <span style="color: #4ade80;"><strong>A</strong></span></p>
<p><strong>Inference code available:</strong> Inference code for open models is accessible, well-maintained, and documented on platforms like GitHub. This facilitates ease of use and integration. <span style="color: #4ade80;"><strong>A</strong></span></p>
<hr />
<h2>Remarks</h2>
<div>
<div>
<div><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">Mistral AI delivers a robust technical portfolio with diverse models, public endpoints, and flexible deployment options, including self-hosting for privacy-conscious users. Data collection practices are clearly defined: Le Chat retains inputs until deletion, APIs store data for 30 days (unless zero retention is activated), and Le Chat Pro defaults to no training use. Privacy controls include opt-out for training and zero retention requests, with streamlined access for Pro users ($14.99/month, $5.99 for students). EU-centric hosting and GDPR compliance enhance data sovereignty, backed by ISO and ANSSI certifications. Open-source models promote transparency, though privacy documentation could be more comprehensive. Following a February 2025 GDPR complaint, Mistral updated its policy to allow free users to object to data processing, aligning with EU regulations. These enhancements solidify Mistral’s position as a privacy-focused AI provider, despite limitations in data export options and proactive policy change notifications.</span></span></div>
</div>
</div>
<div></div>
<div>
<hr />
</div>
<div>
<h2>Privacy and Data Review: Overall Score</h2>
<p><strong><span class="dropcap">77.2/100</span></strong></p>
</div>
<p>&nbsp;</p>
<p>&nbsp;</p>
<ul>
<li data-start="1033" data-end="1076">Data Collection : 20 + 20 + 5 + 15 = <strong data-start="1070" data-end="1076">60</strong></li>
<li data-start="1079" data-end="1119">User Control : 20 + 0 + 15 + 15 = <strong data-start="1113" data-end="1119">50</strong></li>
<li data-start="1122" data-end="1157">Transparency : 15 + 0 + 20 = <strong data-start="1151" data-end="1157">35</strong></li>
<li data-start="1160" data-end="1206">Privacy by Design : 20 + 15 + 20 + 15 + 5 = <strong>75</strong></li>
<li data-start="1209" data-end="1259">Hosting &amp; Sovereignty : 20 + 20 + 20 + 15 = <strong data-start="1253" data-end="1259">75</strong></li>
<li data-start="1262" data-end="1297">Open Source : 20 + 20 + 20 = <strong data-start="1291" data-end="1297">60</strong></li>
</ul>
<p data-start="1299" data-end="1355"><strong>Total  : 60 + 50 + 35 + 75 + 75 + 60 = 355</strong></p>
<p data-start="1299" data-end="1355">23 x 20 = 460</p>
<p data-start="1299" data-end="1355"><strong>365 / 460 x 100 = 77.2</strong></p>
<div>
<hr />
<p data-pm-slice="1 1 []"><em>This evaluation is provided for informational purposes only and reflects a subjective analysis based on publicly available data at the time of publication. We do not guarantee absolute accuracy and disclaim all liability for errors or misinterpretations. Any disputes must be submitted in writing to <a href="mailto:futurofintenet@proton.me" target="_blank" rel="noopener">futurofintenet@proton.me</a></em></p>
<p data-pm-slice="1 1 []"><em>For full methodology, see our complete scoring guide here: <a href="https://futureofinternet.xyz/ai-agents/ai-agents-privacy-data-rating-guide-2025/">LLM Privacy Rating Guide</a></em></p>
</div>
<h2></h2>
<p>L’article <a href="https://futureofinternet.xyz/ai-agents-privacy-reviews/mistral-ai-privacy-and-data-review-2025/">Mistral AI : Privacy and Data Review 2025</a> est apparu en premier sur <a href="https://futureofinternet.xyz">Future of Internet</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Claude Sonnet 4 : Privacy and Data Review 2025</title>
		<link>https://futureofinternet.xyz/ai-agents-privacy-reviews/claude-sonnet-4-privacy-and-data-review-2025/</link>
		
		<dc:creator><![CDATA[futurofinternet]]></dc:creator>
		<pubDate>Tue, 05 Aug 2025 16:01:45 +0000</pubDate>
				<category><![CDATA[AI Agents & Privacy Reviews]]></category>
		<guid isPermaLink="false">https://futureofinternet.xyz/?p=1175</guid>

					<description><![CDATA[<p>Here is our independent evaluation of Claude (anthropic), at the heart of the Web3 revolution and the quest for a sovereign and privacy-respecting AI. Based on an exclusive framework and a rigorous audit of publicly available data, this analysis reflects our vision of a future where privacy is a fundamental right. The scoring system is [&#8230;]</p>
<p>L’article <a href="https://futureofinternet.xyz/ai-agents-privacy-reviews/claude-sonnet-4-privacy-and-data-review-2025/">Claude Sonnet 4 : Privacy and Data Review 2025</a> est apparu en premier sur <a href="https://futureofinternet.xyz">Future of Internet</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Here is our independent evaluation of <a href="https://claude.ai" target="_blank" rel="noopener"><strong>Claude (anthropic)</strong></a>, at the heart of the Web3 revolution and the quest for a sovereign and privacy-respecting AI. Based on an exclusive framework and a rigorous audit of publicly available data, this analysis reflects our vision of a future where privacy is a fundamental right.</p>
<p>The scoring system is based on a comprehensive guide created specifically for this project, accessible <a href="https://futureofinternet.xyz/ai-agents/ai-agents-privacy-data-rating-guide-2025/" target="_blank" rel="noopener">here</a>. This ranking is dynamic, evolving with innovations and feedback from the decentralized community.</p>
<p>Our mission: to enlighten and inform, without filter or influence, to build together a fairer and more transparent AI ecosystem.</p>
<p><em>update : 25/08/05</em></p>
<h2>Key Insights from the Claude Privacy and Data Review</h2>
<h2>Model</h2>
<p>Claude Sonnet 4 : Hybrid reasoning model, optimized for a balance of performance and efficiency, with advanced coding, data analysis, tool use, and agentic task capabilities. Available free on <a href="https://claude.ai" target="_blank" rel="noopener">Claude.ai</a> and via paid plans on Anthropic API, Amazon Bedrock, and Google Cloud Vertex AI.</p>
<hr />
<h2>Data Collection</h2>
<p><strong>Prompts stored:</strong> User data is only used for training with explicit opt-in consent, in line with Anthropic&#8217;s practices. By default, Anthropic employees cannot access conversations unless explicit consent is provided or Usage Policy violations occur. <span style="color: #4ade80;"><strong>A</strong></span></p>
<p><strong>Use for training:</strong> Training uses a mix of public web data (up to March 2025), non-public third-party data, service provider data, data from consenting users, and internally generated data. Cleaning and filtering methods, including deduplication, are applied. <span style="color: #4ade80;"><strong>A</strong></span></p>
<p><strong>Account required:</strong> Yes, an account is required to access the model via Claude.ai, API, or cloud platforms. <strong style="color: #f97316;">C</strong></p>
<p><strong>Data retention duration: </strong>Specific retention periods documented <strong style="color: #f97316;">C</strong></p>
<ul>
<li>Deleted conversations: Immediate removal from history, automatic backend deletion within 30 days</li>
<li>Usage Policy violations: Up to 2 years for inputs/outputs, up to 7 years for safety classification scores</li>
<li>Feedback data: 10 years for consented submissions</li>
</ul>
<hr />
<h2>User Control</h2>
<p><strong>Deletion possible:</strong> Yes, users can delete conversations with immediate removal from conversation history and automatic backend deletion within 30 days. <span style="color: #4ade80;"><strong>A</strong></span></p>
<p><strong>Export possible:</strong> Yes, data exports are available to free/Pro Claude.ai users and Team plan Primary Owners. Users can export conversation data and account information from Settings &gt; Privacy on web app or Claude Desktop (not available on mobile apps). <span style="color: #4ade80;"><strong>A</strong></span></p>
<p><strong>Granularity control:</strong> Claude Enterprise offers custom retention controls (minimum 30 days). Standard users have conversation deletion control. <span style="color: #fbbf24;"><strong>B</strong></span></p>
<p><strong>Explicit user consent:</strong> Explicit consent required for use of data for training, consistent with Anthropic’s stated policy. <span style="color: #4ade80;"><strong>A</strong></span></p>
<hr />
<h2>Transparency</h2>
<p><strong>Clear policy:</strong> Data use and deployment policies are clear, though some aspects (e.g., data retention) lack precision. <span style="color: #fbbf24;"><strong>B</strong></span></p>
<p><strong>Change notification:</strong> Updates are well-documented via the Responsible Scaling Policy and System Cards, including details on security evaluations and deployment decisions. <span style="color: #4ade80;"><strong>A</strong></span></p>
<p><strong>Model documentation:</strong> Full documentation via detailed report and System Card, including performance evaluations (e.g., 72.7% on SWE-bench Verified), security measures (ASL-2), and deployment decisions. <span style="color: #4ade80;"><strong>A</strong></span></p>
<hr />
<h2>Privacy by Design</h2>
<p><strong>Encryption (core &amp; advanced) | <span style="color: #fbbf24;">B </span>| </strong>Data encrypted in transit using TLS and at rest using 256-bit AES encryption. Implementation includes:</p>
<ul class="[&amp;:not(:last-child)_ul]:pb-1 [&amp;:not(:last-child)_ol]:pb-1 list-disc space-y-1.5 pl-7">
<li class="whitespace-normal break-words"><strong>Transport Security</strong>: TLS 1.3 protocol with Perfect Forward Secrecy (PFS)</li>
<li class="whitespace-normal break-words"><strong>At-Rest Encryption</strong>: AES-256 encryption for stored data with encrypted key management</li>
<li class="whitespace-normal break-words"><strong>Access Controls</strong>: Role-based access control (RBAC) with principle of least privilege</li>
<li class="whitespace-normal break-words"><strong>Employee Access</strong>: Zero default access policy &#8211; conversations accessible only with explicit user consent or Usage Policy violations requiring Trust &amp; Safety review</li>
<li class="whitespace-normal break-words"><strong>Research Initiative</strong>: Active development of Confidential Inference via Trusted Virtual Machines for enhanced model weight and user data protection</li>
</ul>
<div><strong>Privacy-Enhancing Technologie</strong> : <span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">Claude Sonnet 4 uses </span></span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-b88u0q r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274">AES-256/TLS 1.3 encryption</span></span></span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3"> for data security and </span></span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-b88u0q r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274">Constitutional AI</span></span></span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3"> with 77 ethical principles to limit sensitive outputs, earning a </span></span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-b88u0q r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274">B</span></span></span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3"> rating due to robust privacy measures but risks from potential multi-turn jailbreaking and limited transparency on training data. User data is excluded from training without consent and deleted within 90 days, enhancing privacy. <strong><span style="color: #fbbf24;">B</span></strong></span></span></div>
<div></div>
<p><strong>Auditability &amp; Certification | <span style="color: #4ade80;">A</span> | </strong>Comprehensive compliance framework including:</p>
<ul class="[&amp;:not(:last-child)_ul]:pb-1 [&amp;:not(:last-child)_ol]:pb-1 list-disc space-y-1.5 pl-7">
<li class="whitespace-normal break-words"><strong>SOC 2 Compliance</strong>: SOC 2 Type I and Type II certifications achieved</li>
<li class="whitespace-normal break-words"><strong>HIPAA Certification</strong>: HIPAA compliance for healthcare data handling</li>
<li class="whitespace-normal break-words"><strong>ISO Standards</strong>: ISO/IEC 42001:2023 certification for AI management system &#8211; first international standard for AI governance</li>
<li class="whitespace-normal break-words"><strong>External Audits</strong>: Regular independent security assessments and penetration testing</li>
<li class="whitespace-normal break-words"><strong>Government Evaluation</strong>: Deep evaluations by US AI Safety Institute, UK AI Security Institute for safety and compliance</li>
<li class="whitespace-normal break-words"><strong>Trust Center</strong>: Publicly accessible compliance artifacts and documentation via Anthropic Trust Center</li>
</ul>
<p><strong>Transparency &amp; Technical Documentation | <span style="color: #4ade80;">A</span> | </strong>Comprehensive technical disclosure including:</p>
<ul class="[&amp;:not(:last-child)_ul]:pb-1 [&amp;:not(:last-child)_ol]:pb-1 list-disc space-y-1.5 pl-7">
<li class="whitespace-normal break-words"><strong>System Cards</strong>: Detailed performance evaluations, security measures (ASL-2 classification), and deployment decisions</li>
<li class="whitespace-normal break-words"><strong>Safety Metrics</strong>: Quantified harmlessness rate (98.99% ±0.23%), jailbreak resistance metrics (6.71% standard mode, 2.24% extended thinking)</li>
<li class="whitespace-normal break-words"><strong>Technical Capabilities</strong>: Documented performance benchmarks (72.7% on SWE-bench Verified), context window specifications (200k tokens), output limits (64k tokens)</li>
<li class="whitespace-normal break-words"><strong>Security Testing</strong>: Prompt injection defense statistics (86% prevention with protections), cyber capability assessments</li>
<li class="whitespace-normal break-words"><strong>Responsible Scaling Policy</strong>: Public documentation of safety thresholds and deployment criteria</li>
</ul>
<p><strong>User-Configurable Privacy Features | <span style="color: #fbbf24;">B </span>| </strong>Tiered privacy control system:</p>
<ul class="[&amp;:not(:last-child)_ul]:pb-1 [&amp;:not(:last-child)_ol]:pb-1 list-disc space-y-1.5 pl-7">
<li class="whitespace-normal break-words"><strong>Enterprise Level</strong>: Custom retention controls (minimum 30 days), enhanced privacy settings, data residency options via cloud providers</li>
<li class="whitespace-normal break-words"><strong>API Clients</strong>: Zero data retention agreements available for qualified enterprise API clients (subject to Anthropic approval)</li>
<li class="whitespace-normal break-words"><strong>Standard Users</strong>: Conversation deletion controls, data export capabilities (Settings &gt; Privacy), opt-out mechanisms for training data</li>
<li class="whitespace-normal break-words"><strong>Claude Code</strong>: Strict read-only permissions by default with explicit permission requests for file modifications</li>
<li class="whitespace-normal break-words"><strong>Telemetry Control</strong>: Environment variable options for disabling analytics collection (DISABLE_TELEMETRY)</li>
</ul>
<hr />
<h2>Hosting &amp; Sovereignty</h2>
<p><strong>Sovereignty | <strong style="color: #f97316;">C </strong>|</strong> Limited options available:</p>
<ul>
<li>Standard deployment: AWS (US East, US West, APAC, Europe) and Google Cloud</li>
<li>Government deployment: AWS GovCloud for US Intelligence Community and national security customers</li>
<li>Claude Gov models: Specialized deployment for classified US national security environments</li>
<li>No general on-premises or local deployment options for commercial customers</li>
</ul>
<p><strong>Legal jurisdiction | <strong style="color: #dc2626;">D </strong>| </strong>Primarily US-based operations with international data transfer protections:</p>
<ul>
<li>EU transfers protected by Adequacy Decisions and Standard Contractual Clauses (SCCs)</li>
<li>Specialized US jurisdiction deployment for government customers</li>
</ul>
<p><strong>Local option | <strong style="color: #f97316;">C </strong>| </strong>Limited local deployment options:</p>
<ul class="[&amp;:not(:last-child)_ul]:pb-1 [&amp;:not(:last-child)_ol]:pb-1 list-disc space-y-1.5 pl-7">
<li class="whitespace-normal break-words">Claude Code can integrate with local MCP servers for desktop applications</li>
<li class="whitespace-normal break-words">Enterprise deployments through Amazon Bedrock or Google Vertex AI</li>
<li class="whitespace-normal break-words">No true on-premises deployment for commercial customers</li>
<li class="whitespace-normal break-words">Government-specific deployments in AWS GovCloud</li>
</ul>
<p><strong>Big Tech dependency:</strong> Confirmed dependency on AWS (regions: US East, US West, APAC, Europe) and Google Cloud Vertex AI for hosting. <strong style="color: #dc2626;">D</strong></p>
<hr />
<h2>Open Source</h2>
<p><strong>Publicly available model:</strong> Proprietary model, not open source. <strong style="color: #dc2626;">D</strong></p>
<p><strong>Clear open source license:</strong> Not applicable. <strong style="color: #dc2626;">D</strong></p>
<p><strong>Inference code available:</strong> Not available. However, Model Context Protocol (MCP) is open protocol for integrations. <strong style="color: #dc2626;">D</strong></p>
<hr />
<h2>Remarks</h2>
<p class="whitespace-normal break-words">Claude Sonnet 4 is a versatile model, surpassing Claude Sonnet 3.7 in multiple domains, notably coding (72.7% on SWE-bench Verified) and data analysis, with a 200k token context window and 64k output max. It is classified under the ASL-2 safety standard, with a harmlessness rate of 98.99% (±0.23%) and improved jailbreak resistance (6.71% in standard mode, 2.24% in extended thinking).</p>
<p class="whitespace-normal break-words">The model has specialized government deployments through Claude Gov models, which are designed for US national security customers and operate in classified environments. Rigorous evaluations have been conducted to minimize risk, including harmlessness training, post-deployment monitoring, and defenses against prompt injection (86% prevention with protections).</p>
<p class="whitespace-normal break-words">Cyber capabilities remain limited (e.g., 1/4 on network challenges), and the model is below ASL-3/ASL-4 thresholds for autonomy and CBRN risk. Available free on Claude.ai, it is well-suited for daily tasks and intermediate coding projects.</p>
<hr />
<h2>Privacy and Data Review: Overall Score</h2>
<p><strong><span class="dropcap">59.78/100</span></strong></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<ul>
<li data-start="1025" data-end="1067">Data Collection : 20 + 20 + 5 + 5 = <strong data-start="1061" data-end="1067">50</strong></li>
<li data-start="1070" data-end="1111">User Control : 20 + 20 + 15 + 20 = <strong data-start="1105" data-end="1111">75</strong></li>
<li data-start="1114" data-end="1150">Transparency : 15 + 20 + 20 = <strong data-start="1144" data-end="1150">55</strong></li>
<li data-start="1153" data-end="1199">Privacy by Design : 15 + 15+ 20 + 20 + 15 = <strong>85</strong></li>
<li data-start="1202" data-end="1248">Hosting &amp; Sovereignty : 5 + 0 + 5 + 0 = <strong data-start="1242" data-end="1248">10</strong></li>
<li data-start="1251" data-end="1282">Open Source : 0 + 0 + 0 = <strong data-start="1277" data-end="1282">0</strong></li>
</ul>
<p data-start="1284" data-end="1339"><strong>Total : 50 + 75 + 55 + 85 + 10 + 0 = 275</strong></p>
<p data-start="1284" data-end="1339">23 x 20 = 460</p>
<p data-start="1284" data-end="1339"><strong>275 / 460 x 100 = 59.78</strong></p>
<hr />
<p data-pm-slice="1 1 []"><em>This evaluation is provided for informational purposes only and reflects a subjective analysis based on publicly available data at the time of publication. We do not guarantee absolute accuracy and disclaim all liability for errors or misinterpretations. Any disputes must be submitted in writing to <a href="mailto:futurofintenet@proton.me" target="_blank" rel="noopener">futurofintenet@proton.me</a></em></p>
<p data-pm-slice="1 1 []"><em>For full methodology, see our complete scoring guide here: <a href="https://futureofinternet.xyz/ai-agents/ai-agents-privacy-data-rating-guide-2025/">LLM Privacy Rating Guide</a></em></p>
<p>L’article <a href="https://futureofinternet.xyz/ai-agents-privacy-reviews/claude-sonnet-4-privacy-and-data-review-2025/">Claude Sonnet 4 : Privacy and Data Review 2025</a> est apparu en premier sur <a href="https://futureofinternet.xyz">Future of Internet</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>ChatGPT 4 : Privacy and Data Review 2025</title>
		<link>https://futureofinternet.xyz/ai-agents-privacy-reviews/privacy-in-llms-chatgpt-privacy-score/</link>
		
		<dc:creator><![CDATA[futurofinternet]]></dc:creator>
		<pubDate>Mon, 04 Aug 2025 08:31:17 +0000</pubDate>
				<category><![CDATA[AI Agents & Privacy Reviews]]></category>
		<guid isPermaLink="false">https://futureofinternet.xyz/?p=1173</guid>

					<description><![CDATA[<p>Here is our independent evaluation of ChatGPT 4 (OpenAI), at the heart of the Web3 revolution and the quest for a sovereign and privacy-respecting AI. Based on an exclusive framework and a rigorous audit of publicly available data, this analysis reflects our vision of a future where privacy is a fundamental right. The scoring system [&#8230;]</p>
<p>L’article <a href="https://futureofinternet.xyz/ai-agents-privacy-reviews/privacy-in-llms-chatgpt-privacy-score/">ChatGPT 4 : Privacy and Data Review 2025</a> est apparu en premier sur <a href="https://futureofinternet.xyz">Future of Internet</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Here is our independent evaluation of <strong>ChatGPT 4 (OpenAI)</strong>, at the heart of the Web3 revolution and the quest for a sovereign and privacy-respecting AI. Based on an exclusive framework and a rigorous audit of publicly available data, this analysis reflects our vision of a future where privacy is a fundamental right.</p>
<p>The scoring system is based on a comprehensive guide created specifically for this project, accessible <a href="https://futureofinternet.xyz/ai-agents/ai-agents-privacy-data-rating-guide-2025/" target="_blank" rel="noopener">here. </a>This ranking is dynamic, evolving with innovations and feedback from the decentralized community.</p>
<p>Our mission: to enlighten and inform, without filter or influence, to build together a fairer and more transparent AI ecosystem.</p>
<h2>Key Insights from the ChatGPT Privacy and Data Review</h2>
<h3>Model</h3>
<ul>
<li>GPT-4</li>
</ul>
<hr />
<h3>Data Collection</h3>
<ul>
<li><strong>Prompts stored: </strong>User prompts and data are stored for service operation, security, and model improvement; temporary chat mode limits storage to 30 days, but retention is otherwise indefinite based on service or legal needs.<strong style="color: #f97316;">C</strong></li>
<li><strong>Use for training: </strong>User content is used for training by default, with an opt-out available in settings; no clear anonymization process for training data, and opt-out is not enabled by default. <strong style="color: #f97316;">C</strong></li>
<li><strong>Account required: </strong>Usage requires a registered account, collecting standard personal data (email, name, etc.), with no anonymous access option. <strong style="color: #f97316;">C</strong></li>
<li><strong>Data retention duration:</strong>
<div><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">Data retention duration: </span></span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">Data is retained as long as necessary for service or legal obligations; temporary chats are deleted within 30 days, but other data retention is potentially indefinite.</span></span><strong style="color: #f97316;">C</strong></div>
</li>
</ul>
<hr />
<h3>User Control</h3>
<ul>
<li><strong>Deletion possible: </strong>Users can delete personal data via self-service in account settings or support requests, but delays (up to 30 days) may occur, and complete deletion of all data (e.g., training sets) is not guaranteed. <strong style="color: #fbbf24;">B</strong></li>
<li><strong>Export possible: </strong>Data export is available via account settings or support request, but limited to conversation history in formats like JSON, with potential exclusions of metadata. <strong style="color: #fbbf24;">B</strong></li>
<li><strong>Granularity control: </strong><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">Granularity control:</span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">&lt;/strong&gt;</span></span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3"> Limited to opt-out for training data; no advanced controls for metadata or other data types for non-enterprise users. </span></span><strong style="color: #f97316;">C</strong></li>
<li><strong>Explicit user consent:</strong>
<div><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">Explicit user consent: </span></span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">Consent is collected at registration, with GDPR rights supported; training data usage is opt-out by default, and settings management can be non-intuitive. </span></span><strong style="color: #fbbf24;">B</strong></div>
</li>
</ul>
<hr />
<h3>Transparency</h3>
<ul>
<li><strong>Clear policy:</strong> Privacy policy is comprehensive, accessible, and regularly updated, detailing data processing for general users. <span style="color: #4ade80;"><strong>A</strong></span></li>
<li><strong>Change notification: </strong>Significant policy or terms changes are notified via email or in-product alerts at least 30 days in advance. <strong style="color: #4ade80;">A</strong></li>
<li><strong>Model documentation: </strong><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">Model documentation:</span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">Limited public documentation on model architecture, training data, or security processes; system cards provide only high-level details. </span></span><strong style="color: #f97316;">C</strong></li>
</ul>
<hr />
<h3>Privacy by Design</h3>
<ul>
<li><strong>Encryption (core &amp; advanced): </strong>AES-256 encryption for data at rest and TLS 1.3 for data in transit; no public details on key management or advanced features like HSM. <span style="color: #fbbf24;"><strong>B</strong></span></li>
<li><strong><strong><strong>Privacy-Enhancing Technologies : </strong></strong></strong><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">ChatGPT-4 employs robust Privacy-Enhancing Technologies like AES-256-GCM encryption, TLS 1.2/1.3, and opt-out data training controls, but past data leaks (e.g., March 2023) and potential jailbreaking risks limit its rating to </span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-b88u0q r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274">B</span></span></span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">. Users should avoid sharing sensitive data and use professional versions for enhanced privacy. </span></span><strong style="color: #fbbf24;">B</strong></li>
<li><strong>Auditability &amp; Certification: </strong><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">Auditability &amp; Certification:</span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">&lt;/strong&gt;</span></span><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3 r-1x3r274"><span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3"> SOC 2 Type 2 certification for enterprise versions, with regular third-party audits; not explicitly confirmed for public version; no ISO 27001 certification. </span></span><strong style="color: #fbbf24;">B</strong></li>
<li><strong>Transparency &amp; Technical Documentation:</strong> Partial public documentation on privacy and security measures via Trust Portal; lacks detailed technical specifics. <span style="color: #fbbf24;"><strong>B</strong></span></li>
<li><strong>User-Configurable Privacy Features:</strong> Basic opt-out for training available; enterprise versions offer advanced controls, but public users have limited options. <span style="color: #f97316;"><strong>C</strong></span></li>
</ul>
<hr />
<h3>Hosting &amp; Sovereignty</h3>
<ul>
<li><strong>Sovereignty:</strong> Data hosted primarily in the USA, outside EU/EEA/CH; GDPR compliance via Standard Contractual Clauses (SCCs), but no EU-US Data Privacy Framework certification. <span style="color: #f97316;"><strong>C</strong></span></li>
<li><strong>Legal jurisdiction:</strong> Ireland for EEA users, USA for others; GDPR compliance ensured through SCCs for data transfers. <span style="color: #fbbf24;"><strong>B</strong></span></li>
<li><strong>Local option: </strong>No local or self-hosting options available for any users. <strong style="color: #dc2626;">D</strong></li>
<li><strong>Big Tech dependency:</strong> Hosted on major cloud providers (likely AWS or Azure), with no explicit alternatives disclosed. <span style="color: #f97316;"><strong>C</strong></span></li>
</ul>
<hr />
<h3>Open Source</h3>
<ul>
<li><strong>Publicly available model: </strong>Fully proprietary model, with no public access to weights or architecture. <strong style="color: #dc2626;">D</strong></li>
<li><strong>Clear open source license: </strong>No open source license; usage governed by proprietary terms of service. <strong style="color: #dc2626;">D</strong></li>
<li><strong>Inference code available: </strong>Inference accessible only via OpenAI API; no public inference code provided. <strong style="color: #f97316;">C</strong></li>
</ul>
<hr />
<h3>Remarks</h3>
<div>These ratings reflect ChatGPT-4’s documented practices as of August 2025, based on OpenAI’s latest policies. Distinctions remain between enterprise and public offerings, with enterprise versions providing more robust controls and certifications. Transparency on advanced cryptographic safeguards (e.g., key management) and cloud infrastructure (e.g., specific providers) is limited. Data handling is clear for end-users, but technical depth is lacking, and no open source or self-hosted options exist.</div>
<hr />
<h2>Privacy and Data Review: Overall Score</h2>
<p><strong><span class="dropcap">47.7/100</span></strong></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<ul>
<li data-start="900" data-end="940">Data Collection : 5 + 5 + 5 + 5 = <strong data-start="934" data-end="940">20</strong></li>
<li data-start="943" data-end="983">User Control : 15 + 15 + 5 + 15 = <strong data-start="977" data-end="983">50</strong></li>
<li data-start="986" data-end="1021">Transparency : 20 + 20 + 5 = <strong data-start="1015" data-end="1021">45</strong></li>
<li data-start="1024" data-end="1069">Privacy by Design : 15 + 15 + 15 + 15 + 5 = <strong data-start="1063" data-end="1069">65</strong></li>
<li data-start="1072" data-end="1119">Hosting &amp; Sovereignty : 5 + 15 + 0 + 5 = <strong data-start="1113" data-end="1119">25</strong></li>
<li data-start="1122" data-end="1153">Open Source : 0 + 0 + 5 = <strong data-start="1148" data-end="1153">5</strong></li>
</ul>
<p data-start="1155" data-end="1199"><strong data-start="1155" data-end="1199">Total : 20 + 50 + 45 + 50 + 25 + 5 = 210</strong></p>
<p data-start="1155" data-end="1199">23 x 20 = 460</p>
<p data-start="1246" data-end="1296"><strong data-start="1246" data-end="1272">210 / 440 × 100 = 47.7</strong></p>
<hr />
<p data-pm-slice="1 1 []"><em>This evaluation is provided for informational purposes only and reflects a subjective analysis based on publicly available data at the time of publication. We do not guarantee absolute accuracy and disclaim all liability for errors or misinterpretations. Any disputes must be submitted in writing to <a href="mailto:futurofintenet@proton.me" target="_blank" rel="noopener">futurofintenet@proton.me</a></em></p>
<p data-pm-slice="1 1 []"><em>For full methodology, see our complete scoring guide here: <a href="https://futureofinternet.xyz/ai-agents/ai-agents-privacy-data-rating-guide-2025/">LLM Privacy Rating Guide</a></em></p>
<p>L’article <a href="https://futureofinternet.xyz/ai-agents-privacy-reviews/privacy-in-llms-chatgpt-privacy-score/">ChatGPT 4 : Privacy and Data Review 2025</a> est apparu en premier sur <a href="https://futureofinternet.xyz">Future of Internet</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
