Privacy and Data Protection

6G Deep Dive is designed with strict privacy principles to ensure that user content remains confidential at all times. The platform does not store prompts, conversations, contribution texts, or any interaction data. All processing happens in real time, and once a response is generated, the underlying input is immediately discarded.

How your data is processed

User queries, contribution texts, and retrieved specification excerpts are used only for generating the requested answer. They are not logged, saved, profiled, or reused in any form. The system performs all processing through secure, encrypted channels and does not retain any of the content after the response is delivered.

What is never stored

  • No prompts or chat messages
  • No contribution texts or evaluation inputs
  • No RAG‑retrieved context
  • No generated outputs
  • No conversation history
  • No long‑term behavioral or usage profiles

Only essential metadata is retained, such as subscription status, token usage totals, and billing information. None of this metadata contains user content.

Secure model execution

All AI processing is performed through OpenAI’s API, which provides strong privacy guarantees. OpenAI does not use API data to train its models, and all requests are encrypted end‑to‑end. This ensures that user content is never used for model improvement and is never accessible to other customers.

Data minimization and retention

The platform follows a strict data‑minimization policy:

  • Only authentication details, subscription records, and token usage counts are stored.
  • No raw text, prompts, or RAG contexts are retained.
  • No logs contain user content.
  • Account deletion removes all associated metadata from the database.

This approach ensures that sensitive or proprietary 3GPP material never persists beyond the active request.

Infrastructure security

The system runs on secure, modern infrastructure:

  • Vercel for hosting
  • Neon serverless PostgreSQL for encrypted metadata storage
  • Stripe for PCI‑compliant payments
  • NextAuth for secure authentication

All components use encrypted connections, isolated API keys, and strict access controls.

User control

Users can manage their subscription, view their usage, and delete their account at any time. Account deletion removes all stored metadata, and because no prompts or content are ever saved, there is nothing else to erase.