Replying to Avatar OpenSecret

🚀 Maple AI Launch! Our end-to-end encrypted AI chat app, Maple AI, is now available! Try it for free and experience private AI conversations that sync automatically in private across your devices. https://trymaple.ai

48% of organizations and businesses risk security and intellectual property by entering non-public info into AI apps. Maple AI changes the game with end-to-end encryption for secure chats. Work and personal use, it's all private between you and the LLM.

Our server code is open source, so you can verify the security and integrity of our platform. Confidential computing ensures your conversations remain private, with cryptographic proof based on reproducible builds. Don't trust us to be honest, verify.

We offer flexible pricing plans: Free (10 chats/week), Starter ($5.99/month), and Pro ($20/month). Pay with credit card or Bitcoin. Prices are discounted until Jan 31st!

We wrote up more explaining the launch on our blog: https://blog.opensecret.cloud/maple-private-ai-for-work-and-personal

Are you a developer? Maple AI is the first app built on our revolutionary new platform, which provides a suite of secure tools for developers. With OpenSecret, you can add secure auth, private key management, encrypted data sync, private AI, and more to your own app. https://blog.opensecret.cloud/introducing-opensecret/

Sign up for Maple AI now and experience the future of secure and private AI. Our open-source technology and end-to-end encryption keep your conversations safe and private, on all your devices. https://trymaple.ai

I've seen similar claims before but my distrust hinges on my distrust for "Confidential computing" or other "secure element" type of hardware that promise to be unhackable.

Everybody telling a hand full of LLMs their biggest problems in work and life is a real problem but those most interested in that data would be the most incentivized to launch something like "Maple AI" and how would you proof that you're not a CIA cutout? Cause state actors clearly have backdoors to such devices that are not publicly known.

Reply to this note

Please Login to reply.

Discussion

No replies yet.