Transparency. All artifacts that govern or have access to prompts and completions are recorded over a tamper-proof, verifiable transparency ledger. External auditors can overview any Edition of those artifacts and report any vulnerability to our Microsoft Bug Bounty program. Confidential computing helps protected data when it can be actively in-u