2 Comments

> 'ensuring that sensitive information is accessible only to authorized entities and processes within KIN'

I'm sorry but I don't quite follow how this is distinct from the LinkedIn privacy policy you started with as a counterexample. If you were served with a subpoena, would you be able to comply and provide the user's notes or not? If not, how does the cloud-based LLM processing actually work in a provably trusted way?

Expand full comment