Part 4 of 4 in the series "The Road to Privacy in Personal AI". If you value your privacy and wish to take control of your personal data, we invite you to join the KIN community. By getting a KIN, you'll be part of a movement.
> 'ensuring that sensitive information is accessible only to authorized entities and processes within KIN'
I'm sorry but I don't quite follow how this is distinct from the LinkedIn privacy policy you started with as a counterexample. If you were served with a subpoena, would you be able to comply and provide the user's notes or not? If not, how does the cloud-based LLM processing actually work in a provably trusted way?
> 'ensuring that sensitive information is accessible only to authorized entities and processes within KIN'
I'm sorry but I don't quite follow how this is distinct from the LinkedIn privacy policy you started with as a counterexample. If you were served with a subpoena, would you be able to comply and provide the user's notes or not? If not, how does the cloud-based LLM processing actually work in a provably trusted way?