CamoText 🛡 (@camotext) 's Twitter Profile
CamoText 🛡

@camotext

⨳ Offline Anonymizer ⨳ Use LLMs without PII leaving your machine

ID: 1887970341173215237

linkhttps://camotext.ai/ calendar_today07-02-2025 21:03:18

47 Tweet

241 Followers

306 Following

CamoText 🛡 (@camotext) 's Twitter Profile Photo

Data anonymization and de-identification are often looped together, but have different meanings under privacy regs like GDPR and HIPAA. You can use CamoText for either, but ensure you understand the differences! camotext.ai/blogposts/anon…

CamoText 🛡 (@camotext) 's Twitter Profile Photo

Do not rely on third parties' promises of privacy; sometimes it's not their choice. New legislation, regulatory guidance, and judicial orders can arise at any time. Use tools that you control, on your device, on your terms.

Do not rely on third parties' promises of privacy; sometimes it's not their choice. New legislation, regulatory guidance, and judicial orders can arise at any time.

Use tools that you control, on your device, on your terms.
Erich Dylus (@erichdylus) 's Twitter Profile Photo

No better advertisement for privacy tooling than “if our LLM thinks you’re doing something bad it will call the authorities on you”

No better advertisement for privacy tooling than “if our LLM thinks you’re doing something bad it will call the authorities on you”
Luca Beurer-Kellner (@lbeurerkellner) 's Twitter Profile Photo

After some tool calls, Claude creates a PR, leaking everything. This includes: full names, travel plans, salary, list of private repos, etc.

After some tool calls, Claude creates a PR, leaking everything. 

This includes: full names, travel plans, salary, list of private repos, etc.
CamoText 🛡 (@camotext) 's Twitter Profile Photo

Few realize that even with on-prem or private cloud-hosted AI, if a client terminates or requests a GDPR removal, true deletion is extremely complex if not practically impossible. All inputs should be de-identified whenever possible.

Ludlow Institute (@ludlowinstitute) 's Twitter Profile Photo

Saying privacy is already lost overlooks the progress being made in developing practical, privacy-preserving tools. This view risks discouraging participation in efforts that are still very much worth pursuing - now more than ever. Let's band together and usher in a new era of

Naomi Brockwell priv/acc (@naomibrockwell) 's Twitter Profile Photo

Regulations change with politics. Encryption doesn’t. If your privacy depends on a law, it can be repealed. If it depends on math, it holds, no matter who’s in power. Choose tools that are private by design, not just by promise.

CamoText 🛡 (@camotext) 's Twitter Profile Photo

As LLMs employ more sophisticated methods of data collection and inference it’s imperative to be principled about privacy in a way that doesn’t defer to hosts’ privacy policies or current regulations (both of which are temporary and may not be strictly followed..)

Ludlow Institute (@ludlowinstitute) 's Twitter Profile Photo

End-to-end encryption secures data in transit, but once it lands, privacy depends on the device's integrity. This underscores the importance of maintaining strong privacy practices at the device level.

CamoText 🛡 (@camotext) 's Twitter Profile Photo

Many other privacy tools rely on cloud services, so user data is only as safe as the company’s current policies. Those can change Fully local, on-device tools avoid these problems. No data sent to external servers: no hidden logs, no future term changes, nothing for AI to crawl