we must always advertise dependable use of these technologies by adhering to field pointers that emphasize transparency and disclosure. Regular software updates and protection audits may also help determine and patch vulnerabilities. we have to also be transparent about knowledge storage methods and inform end users if any info is shared with 3rd