

Link, for most of the people in this thread surprised that Proton does what it’s pretty clear in saying they’ll do.
And people getting into trouble for using proton for stuff they are saying not to do.
https://proton.me/blog/protonmail-threat-model
Not recommended
If you are attempting to leak state secrets (as was the case of Edward Snowden) or going up against a powerful state adversary, email may not be the most secure medium for communications. The Internet is generally not anonymous, and if you are breaking Swiss law, a law-abiding company such as Proton Mail can be legally compelled to log your IP address. A powerful state adversary will also be better positioned to launch one of the attacks described above against you, which may negate the privacy protection provided by Proton Mail. While we can offer more protection and security, we cannot guarantee your safety against a powerful adversary.






Maybe I’m misunderstanding, but are you saying that you use LLMs as refactoring tools, so things like to move code around, rename stuff, extract functions, and make changes that don’t change the logic?
Or is it something else? Because as far as I know, LLMs are pretty bad at not making random changes, even if told to just reorder stuff, plus we have a lot of deterministic tools for that job, so I guess you probably mean something else. Honest question.