Very doubtful they would be doing that for reading your prom...

Juraj
npub1m2mvvpjugwdehtaskrcl7ksvdqnnhnjur9v6g9v266nss504q7mqvlr8p9
hex
f239ff0c36c3fa91da4ce135f15572746bdc6a2473e176adff1cb35818f12088nevent
nevent1qqs0yw0lpsmv8753mfxwzd0324e8g67udgj88ctk4hl3ev6crrcjpzqprpmhxue69uhhyetvv9ujuem4d36kwatvw5hx6mm9qgsd4dkxqewy8xum47ctpu0ltgxxsfemeewpjkdyzk9ddfcg286s0dssxf4dpKind-1 (TextNote)
↳ Reply to Leo Wandersleb (npub1gm7tuvr9atc6u7q3gevjfeyfyvmrlul4y67k7u7hcxztz67ceexs078rf6)
> You can run hw attested end to end encrypted inference in cloud. That's ... not really an option for sensitive data. It's very naive to trust the p...
Very doubtful they would be doing that for reading your prompts. Again, game theory. You would be doing that for a crypto bridge to steal private keys.
Raw JSON
{
"kind": 1,
"id": "f239ff0c36c3fa91da4ce135f15572746bdc6a2473e176adff1cb35818f12088",
"pubkey": "dab6c6065c439b9bafb0b0f1ff5a0c68273bce5c1959a4158ad6a70851f507b6",
"created_at": 1774459501,
"tags": [
[
"p",
"dab6c6065c439b9bafb0b0f1ff5a0c68273bce5c1959a4158ad6a70851f507b6",
"",
"mention"
],
[
"p",
"46fcbe3065eaf1ae7811465924e48923363ff3f526bd6f73d7c184b16bd8ce4d",
"",
"mention"
],
[
"e",
"7e75f25eece265238b5ea6020c85b730c84a5ebc670ce8a4b99634f928e2be19",
"",
"root"
],
[
"e",
"44de7d18790af97bed686299a9f53cff871cbdbb2c8188b67b863012ca1d94c3",
"",
"reply"
]
],
"content": "Very doubtful they would be doing that for reading your prompts. Again, game theory. You would be doing that for a crypto bridge to steal private keys. ",
"sig": "d6792594442ca085f6d5ff72c80b9d7a8cd46586939b96f893c255c7fc7b20c7b225cda712fc00518dab4440fbe68705a66905834d5f1a36c237162407f205ba"
}