Technologyabout 2 months ago2 min read

Signal creator Moxie Marlinspike wants to do for AI what he did for messaging

AT

Byline

Ars Technica

Technology Correspondent

Covers technology developments with editorial context for decision-focused readers.

Signal creator Moxie Marlinspike wants to do for AI what he did for messaging
Image source: Ars Technica

Why it matters

On Confer, remote attestation allows anyone to reproduce the bit-by-bit outputs that confirm that the publicly available proxy and image software—and only that software—is running on the server.

Key takeaways

  • Linux support also doesn’t exist, although this extension bridges that gap.Another publicly available LLM offering E2EE is Lumo, provided by Proton, a European company that’s behind the popular encrypted email service.
  • No data is stored on the remote server.Most of the big LLM platforms offer a means for users to exempt their conversations and data for marketing and training purposes.
  • Users can opt to store the encrypted data on Proton servers for device syncing or have it wiped immediately after the conversation is finished.A third LLM provider promising privacy is Venice.

On Confer, remote attestation allows anyone to reproduce the bit-by-bit outputs that confirm that the publicly available proxy and image software—and only that software—is running on the server. To further verify Confer is running as promised, each release is digitally signed and published in a transparency log.

Native support for Confer is available in the most recent versions of macOS, iOS, and Android. On Windows, users must install a third-party authenticator. Linux support also doesn’t exist, although this extension bridges that gap.

Another publicly available LLM offering E2EE is Lumo, provided by Proton, a European company that’s behind the popular encrypted email service. It adopts the same encryption engine used by Proton Mail, Drive, and Calendar. The internals of the engine are considerably more complicated than Confer because they rely on a series of both symmetric and asymmetric keys. The end result for the user is largely the same, however.

Once a user authenticates to their account, Proton says, all conversations, data, and metadata is encrypted with a symmetrical key that only the user has. Users can opt to store the encrypted data on Proton servers for device syncing or have it wiped immediately after the conversation is finished.

A third LLM provider promising privacy is Venice. It stores all data locally, meaning on the user device. No data is stored on the remote server.

Most of the big LLM platforms offer a means for users to exempt their conversations and data for marketing and training purposes. But as noted earlier, these promises often come with major carve-outs. Besides selected review by humans, personal data may still be used to enforce terms of service or for other internal purposes, even when users have opted out of default storage.

Given today’s legal landscape—which allows most data stored online to be obtained with a subpoena—and the regular occurrence of blockbuster data breaches by hackers, there can be no reasonable expectation that personal data remains private.

It would be great if big providers offered end-to-end encryption protections, but there’s currently no indication they plan to do so. Until then, there are a handful of smaller alternatives that will keep user data out of the ever-growing data lake.

Ars TechnicaVerified

Curated by Dr. Elena Rodriguez

Sources & Further Reading

Key references used for verification and additional context.

Verification

Grade D1 unique evidence links

Publisher: Ars Technica

Source tier: Unranked

Editorial standards: Our process

Corrections: Report an issue

Published: Jan 13, 2026

Read time: 2 min

Category: Technology