{"id":31192,"date":"2026-01-26T12:00:02","date_gmt":"2026-01-26T15:00:02","guid":{"rendered":"https:\/\/www.tedic.org\/?p=31192"},"modified":"2026-02-09T09:50:17","modified_gmt":"2026-02-09T12:50:17","slug":"security-privacy-and-chatbots-2","status":"publish","type":"post","link":"https:\/\/www.tedic.org\/en\/security-privacy-and-chatbots-2\/","title":{"rendered":"Security, Privacy, and Chatbots"},"content":{"rendered":"\n<p>If you\u2019re interested in security and privacy, and you\u2019re also explicitly using \u201cartificial intelligence\u201d (AI) chatbots, we want to raise some concerns we have regarding their use.<\/p>\n\n\n\n<p>As new technologies, and considering that they are produced from a capitalist center, we know that the only thing that matters to the large corporations developing them is maximizing their profits: if that implies taking care of users\u2019 privacy and security, they will do so. But if the competition is about who can launch a new version of a new technology with more functionality faster, we can run into problems. And that is precisely the situation we are in.<\/p>\n\n\n\n<p>We are not going to cover the fact that search engines like Google <span id='easy-footnote-1-31192' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.tedic.org\/en\/security-privacy-and-chatbots-2\/#easy-footnote-bottom-1-31192' title='. By the way, if you already hate that Google gives you results as if it were a bot, you can do two things: i) use another search engine like DuckDuckGo or SearX (list of many instances), or ii) use this cleaner search: &lt;a href=&quot;https:\/\/udm14.com\/%5B\/note&quot;&gt;https:\/\/udm14.com\/&lt;\/a&gt; '><sup>1<\/sup><\/a><\/span> or messaging apps like WhatsApp are explicitly incorporating this for users. Nor do we include the fact that now everything \u201cis\u201d or has AI: scripts, household appliances, prosthetics, websites\u2014everything comes with AI. Here we are going to focus on the case when you explicitly open a chatbot to obtain results: whether for work, health, emotional matters, or for fun.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">From everyday use to systematic surveillance<\/h3>\n\n\n\n<p>The use of these technologies is widespread and has deeply penetrated connected society (let\u2019s not forget the digital divides), so much so that it has displaced search engines as a way to stay informed, solve problems, and deepen knowledge. Some statistics indicate that in 2023, 35% of people had already stopped using search engines, with constant growth, and that 70% of people surveyed by <em>Consumer Reports<\/em> stated that they had used this type of technology in some way in the last three months <span id='easy-footnote-2-31192' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.tedic.org\/en\/security-privacy-and-chatbots-2\/#easy-footnote-bottom-2-31192' title='See report: &lt;a href=&quot;https:\/\/explodingtopics.com\/blog\/chatbot-statistics%5B\/note&quot;&gt;https:\/\/explodingtopics.com\/blog\/chatbot-statistics&lt;\/a&gt; '><sup>2<\/sup><\/a><\/span>. In practice, this means that millions of people regularly use chatbots to which they entrust personal, work-related, emotional, and political queries, handing over large amounts of information without there yet being a clear and shared understanding of how these data are protected, stored, analyzed, or reused.<\/p>\n\n\n\n<p>So it is interesting to see that everything you write and every file you upload will be stored, analyzed, and used by these platforms to improve their businesses: whether to \u201cretrain the models,\u201d to \u201cprofile you\u201d in order to sell you advertising, or to sell you the very thing you were just talking about with your friends. Even to know your political leanings and offer you the discourse you want to hear, thus manipulating political elections <span id='easy-footnote-3-31192' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.tedic.org\/en\/security-privacy-and-chatbots-2\/#easy-footnote-bottom-3-31192' title='As an example of the latter, we can cite the Cambridge Analytica case, among others'><sup>3<\/sup><\/a><\/span>.<\/p>\n\n\n\n<p>Supposedly not all companies do this in the same way; some seem to find it beneficial to present themselves as concerned about their users\u2019 privacy, such as when Apple boasted about not collecting as much metadata as Facebook <span id='easy-footnote-4-31192' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.tedic.org\/en\/security-privacy-and-chatbots-2\/#easy-footnote-bottom-4-31192' title='See the metadata collection scheme of iMessage vs. WhatsApp and others in our article about Signal.'><sup>4<\/sup><\/a><\/span>. Amanda Caswell has analyzed the privacy of several chatbots in her article \u201cPrivacy comparison of ChatGPT, Gemini, Perplexity, and Claude,\u201d which we recommend reading.<\/p>\n\n\n\n<p>We also know that large corporations use this Big Data <span id='easy-footnote-5-31192' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.tedic.org\/en\/security-privacy-and-chatbots-2\/#easy-footnote-bottom-5-31192' title='A term that has gone out of fashion, but not out of relevance. Read more at: &lt;a href=&quot;https:\/\/es.wikipedia.org\/wiki\/Macrodatos%5B\/note&quot;&gt;https:\/\/es.wikipedia.org\/wiki\/Macrodatos&lt;\/a&gt; '><sup>5<\/sup><\/a><\/span> in collaboration with states to carry out \u201cmass surveillance\u201d of the entire population\u2014something Shoshana Zuboff has called \u201csurveillance capitalism\u201d <span id='easy-footnote-7-31192' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.tedic.org\/en\/security-privacy-and-chatbots-2\/#easy-footnote-bottom-7-31192' title='&lt;a href=&quot;https:\/\/es.wikipedia.org\/wiki\/Capitalismo_de_vigilancia%5B\/note&quot;&gt;https:\/\/es.wikipedia.org\/wiki\/Capitalismo_de_vigilancia&lt;\/a&gt; [\/note[ and which has been denounced for decades, with the first strongly documented proof emerging from Edward Snowden\u2019s leaks &lt;span id=&#039;easy-footnote-6-31192&#039; class=&#039;easy-footnote-margin-adjust&#039;&gt;&lt;\/span&gt;&lt;span class=&#039;easy-footnote&#039;&gt;&lt;a href=&#039;https:\/\/www.tedic.org\/en\/security-privacy-and-chatbots-2\/#easy-footnote-bottom-6-31192&#039; title=&#039;&#039;&gt;&lt;sup&gt;6&lt;\/sup&gt;&lt;\/a&gt;&lt;\/span&gt;Access Snowden\u2019s biography and the details of his case at: &lt;a href=&quot;https:\/\/es.wikipedia.org\/wiki\/Edward_Snowden%5B\/note&quot;&gt;https:\/\/es.wikipedia.org\/wiki\/Edward_Snowden&lt;\/a&gt; '><sup>7<\/sup><\/a><\/span>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Your data, chatbots, and their risks<\/h3>\n\n\n\n<p>On the other hand, it\u2019s not that we want to promote the use of this highly controversial technology that has been released upon humanity without any kind of control, but we know that to a greater or lesser extent, \u201call\u201d of us end up explicitly using them in some way (not counting all the ways we use them without knowing it, of course). We also know that they produce very good results, for example by analyzing medical outcomes to find problems when there are millions of options to check. We neither oppose all uses, nor do we promote total use as some people seem to be doing.<\/p>\n\n\n\n<p>All of this has to do with people\u2019s privacy, but there are also elements that involve security problems <span id='easy-footnote-8-31192' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.tedic.org\/en\/security-privacy-and-chatbots-2\/#easy-footnote-bottom-8-31192' title='If you\u2019re a bit of a nerd and want to dig deeper into the security issues of these technologies, we recommend this video by \u201cChema Alonso\u201d on the topic'><sup>8<\/sup><\/a><\/span>. For example:<\/p>\n\n\n\n<p>What happens when these platforms are breached and someone extracts that \u201cBig Data\u201d about you? <span id='easy-footnote-9-31192' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.tedic.org\/en\/security-privacy-and-chatbots-2\/#easy-footnote-bottom-9-31192' title='A simple search is enough to verify how many times this has already happened.'><sup>9<\/sup><\/a><\/span><\/p>\n\n\n\n<p>What happens if someone downloads all their \u201cprompts\u201d and all your files from one of these companies? That attacker might obtain your personal information, your address, your health or emotional status, images of your children, work documents, etc., etc.<\/p>\n\n\n\n<p>If you want to check this and you use one of these bots with your account\u2014say, ChatGPT\u2014you can go to your profile (bottom left), choose \u201cSettings,\u201d then \u201cData Controls\u201d &gt; \u201cExport.\u201d The platform will prepare and send you a compressed file with all your conversations and all the files you uploaded. If you make medium or advanced use of it, you\u2019ll be surprised by the amount of information they have about you\u2014and that is only from the interface between the bot and you; it does not mean that it\u2019s all they have about you.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Usage strategies, privacy by design, and anonymization<\/h3>\n\n\n\n<p>So if you still plan to use them, we recommend adding a section to your personal threat model, or to your organization\u2019s digital protection strategy. How? We can\u2019t answer that directly: it will depend on the type of use and the depth at which you are using these technologies, the type and size of your organization, and other factors.<\/p>\n\n\n\n<p>Along these lines, we can recommend two platforms that focus on promoting users\u2019 privacy:<\/p>\n\n\n\n<p><strong>Duck.ai (by DuckDuckGo)<\/strong> \u2013 allows you to use several well-known LLM models in a self-hosted installation, without even the possibility of identifying yourself.<\/p>\n\n\n\n<p><strong>LUMO (by the Proton Foundation)<\/strong> \u2013 with certain usage limits and optional identification.<\/p>\n\n\n\n<p>And here we reproduce a comparison provided precisely by the Proton Foundation:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1248\" height=\"384\" src=\"https:\/\/www.tedic.org\/wp-content\/uploads\/2025\/12\/imagen-8.png\" alt=\"\" class=\"wp-image-30957\" srcset=\"https:\/\/www.tedic.org\/wp-content\/uploads\/2025\/12\/imagen-8.png 1248w, https:\/\/www.tedic.org\/wp-content\/uploads\/2025\/12\/imagen-8-300x92.png 300w, https:\/\/www.tedic.org\/wp-content\/uploads\/2025\/12\/imagen-8-768x236.png 768w\" sizes=\"auto, (max-width: 1248px) 100vw, 1248px\" \/><\/figure>\n\n\n\n<p>If you still decide that you want to keep using the well-known, famous, and corporate ones directly, there are several cases in which (at the time of writing this article) it is not necessary to identify yourself:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/chatgpt.com\" target=\"_blank\" rel=\"noreferrer noopener\">ChatGPT<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/copilot.microsoft.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Copilot<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/chat.mistral.ai\/chat\" target=\"_blank\" rel=\"noreferrer noopener\">LeChat<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.perplexity.ai\/\" target=\"_blank\" rel=\"noreferrer noopener\">Perplexity AI<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/grok.x.ai\" target=\"_blank\" rel=\"noreferrer noopener\">Grok<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/gemini.google.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Gemini<\/a><\/li>\n<\/ul>\n\n\n\n<p>This is a bit more inconvenient, because several of these will limit you and repeatedly bother you to identify yourself, and sometimes the results will not be as perfect as you want, since the \u201cagents\u201d will know less about you. Nor is it a guarantee that they won\u2019t identify you anyway and include you in their Big Data, but what <em>does<\/em> happen is that all your \u201cprompts\u201d\u2014everything you could download from your account\u2014will not be available as historical material in your profile. Your footprint will be smaller, and the association with your real identity will also be smaller. If you want to go further in terms of protection, you can try using some of these with the <a href=\"https:\/\/www.torproject.org\/es\" target=\"_blank\" rel=\"noreferrer noopener\">Navegador Tor<\/a>. It won\u2019t be easy, since they put up many barriers to its use, but you can try.<\/p>\n\n\n\n<p>So, in conclusion, we can tell you this: if you are going to use this very novel and controversial technology, do it without identifying yourself. We hope that in the future we will be able to rely on cutting-edge technology, but with \u201cprivacy and security by design.\u201d<\/p>\n\n\n\n<p><strong>Featured image:<\/strong> Remix of <a href=\"https:\/\/www.flickr.com\/photos\/61707607@N02\/8488060869\" data-type=\"link\" data-id=\"https:\/\/www.flickr.com\/photos\/61707607@N02\/8488060869\"><em>Stadio Alicante<\/em>, licensed under CC BY 2.0.<\/a><\/p>\n\n\n\n<p><em>This publication has been funded by the European Union. Its contents are the sole responsibility of TEDIC and do not necessarily reflect the views of the European Union.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>If you\u2019re interested in security and privacy, and you\u2019re also explicitly using \u201cartificial intelligence\u201d (AI) chatbots, we want to raise [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":31197,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[1233],"tags":[],"class_list":["post-31192","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-en"],"_links":{"self":[{"href":"https:\/\/www.tedic.org\/en\/wp-json\/wp\/v2\/posts\/31192","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tedic.org\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tedic.org\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tedic.org\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tedic.org\/en\/wp-json\/wp\/v2\/comments?post=31192"}],"version-history":[{"count":5,"href":"https:\/\/www.tedic.org\/en\/wp-json\/wp\/v2\/posts\/31192\/revisions"}],"predecessor-version":[{"id":31376,"href":"https:\/\/www.tedic.org\/en\/wp-json\/wp\/v2\/posts\/31192\/revisions\/31376"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tedic.org\/en\/wp-json\/wp\/v2\/media\/31197"}],"wp:attachment":[{"href":"https:\/\/www.tedic.org\/en\/wp-json\/wp\/v2\/media?parent=31192"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tedic.org\/en\/wp-json\/wp\/v2\/categories?post=31192"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tedic.org\/en\/wp-json\/wp\/v2\/tags?post=31192"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}