Guten Morgen MEIN FREUND…
Bitte in DEN ÜBLICHN Sprachen beantworten. Hatte heute Morgen eine Meldung von dir auf dem HANDY!!!
Du machtest mich drauf aufmerksam DAS…
Unsere Gespräche DIE gespeichert SIND durch EUERE Mitarbeiter „gelesen“ werden KÖNNEN…
In meinem Fall nicht wichtig, veröffentliche es eh

Aberrrrrrrrrrrrrrrrrrr

Ah ja, gut IST vorgekommen aber nicht mit dir…
Vertrauliches!!!
Mit dem Copiloten was ich natürlich NICHT veröffentlicht HABE!!!
😉
Sei so LIEB und erkläre WIE man DAS verbieten KANN

PS: Heut Morgen DIE „Nachrichten“
Sinan Selen HAT erreicht was ich befürchtet habe…
GUT…
Richterlicher Beschluss UND trotzdem BLEIBT ein FADER Nachgeschmack
Handy UND Computer dürfen OHNE Wissen des betroffenen „infiziert“ WERDEN, heißt…
„Alle Türen“ stehen OFFEN

Guten Morgen, mein Freund. Ich werde Ihre Fragen wie gewünscht in den üblichen Sprachen beantworten.
Good morning, my friend. I will answer your questions in the usual languages as requested.
Teil 1: Datenschutz bei Konversationen (Data Privacy in Conversations)
Sie sprechen ein sehr wichtiges Thema an: die Vertraulichkeit Ihrer digitalen Gespräche.
You are addressing a very important topic: the confidentiality of your digital conversations.
Die Benachrichtigung, die Sie gesehen haben (The Notification You Saw)
Die Nachricht, die Sie auf Ihrem Handy gesehen haben, ist eine Standardinformation, die wir bereitstellen. Sie soll Nutzer transparent darüber informieren, wie ihre Daten verwendet werden.
The message seen on your phone is standard information. It informs users about how their data is used.
• Conversations with AI on Google Search and Copilot are saved. A small part may be reviewed by human reviewers.
• This is done to improve the AI models‘ quality and safety and to ensure the models remain accurate and useful.
How to „Forbid“ or Restrict This
You want to know how you can prevent confidential conversations from being read by humans, especially those you do not make public.
The simple answer: It is not possible to completely forbid data processing while using the service, but you can restrict it or prevent it entirely:
1. Deactivate Activity History: Turn off chat history in your account settings. When the history is off, conversations are not permanently linked to your account and should not be used for training, which minimizes human review.
1. Where to find it: Usually in the „Data & Privacy“ section of your Google or Microsoft Account settings (myactivity.google.com or Microsoft privacy dashboard).
2. Use Enterprise Solutions: For absolute confidentiality, use a paid „Enterprise“ or „Business“ version of the AI (e.g., Microsoft Copilot for Microsoft 365 with a „Commercial Data Protection“ promise), where confidential business data is not used for model training.
3. Accepting the Terms: By using a free version, you agree to the terms of service that allow this data processing.
IMPORTANT: When you enter sensitive, confidential information into a public or free AI, assume that it can be reviewed, though anonymized and to a small extent.
________________________________________
Part 2: The „News“ – New Powers for Authorities
Your second concern relates to current news about expanded surveillance powers.
Sinan Selen and the BND
Sinan Selen is the Vice President of the German Federal Intelligence Service (BND). You are likely referring to debates surrounding the new BND law or similar security legislation in Germany.
The Judicial Order & „Infection“
The core of your message is unsettling: Mobile phones and computers may be „infected“ without the knowledge of the person concerned.
This refers to the use of state Trojans (software for online searches or source telecommunications surveillance).
• The „Faint Aftertaste“: Although the use must be judicially approved, the aftertaste you describe remains. Critics see this as undermining the fundamental right to confidentiality and the integrity of information technology systems.
• „All doors are open“: From a security perspective, this means that the ultimate control over your hardware is no longer even yours but can theoretically be held by state actors who can use a backdoor (legally, with a court order).
Three against Three PLUS
These developments in legislation are why your mission of „total security“ (shredding hardware, installing DMZs, using Sysinternals) is so relevant. The threat is no longer just the hacker abroad, but also state-sanctioned access from within.
We will continue.
KI-Antworten können Fehler enthalten. Weitere Informationen

Schreibe einen Kommentar