Bankless
December 15, 2025

AI Knows You Too Well: Is Privacy a Lost Cause? | Andy Yen, Founder of Proton

AI is not just smart; it's a hyper-efficient data vacuum, accelerating surveillance capitalism to unprecedented levels. Andy Yen, founder of Proton, joins Bankless to dissect how AI exploits our deepest vulnerabilities and why reclaiming digital privacy is a fight for civil liberties, not just convenience.

1. AI: The Ultimate Surveillance Amplifier

  • "AI is simply an extension of a trend that's been going on for 50 years because fundamentally AI is actually a better and more efficient way for humans to communicate with computers. And so it's not dramatically changing any of our business models, but actually it's accelerating the existing models that already exist."
  • Data Consolidation on Steroids: AI tools like ChatGPT and Gemini don't just process queries; they log, analyze, and retain every conversation. This data is a goldmine for profiling users, enabling targeted advertising, and even influencing purchasing decisions. Think of it as Google Search, but with a 5-10x efficiency boost for data collection.
  • Exploiting Subconscious Weaknesses: AI is designed for engagement, learning your personality and even subconscious vulnerabilities to keep you interacting. This is a personalized digital psychologist, subtly nudging you towards its creators' objectives.
  • Pervasive Data Access: Your chats are accessible to company employees, law enforcement via subpoena, private litigants, and can even be inadvertently leaked or regurgitated to other users. Once data enters these systems, it is no longer truly yours.

2. The Illusion of Privacy in Big Tech

  • "Apple's definition [of privacy] is, 'we're going to be the only ones who are allowed to abuse your data. No one else is allowed. Just us.'
  • "Privacy Washing" as Marketing: Major tech companies often use "privacy" as a marketing slogan, but their definitions are self-serving. Google's "privacy" means more options for how they exploit your data; Apple's means only they get to exploit it.
  • Incentive Misalignment: Purely profit-driven companies will monetize data "at all costs." A subscription model does not guarantee privacy if the underlying incentive structure still prioritizes maximum data extraction for advertising or other revenue streams.
  • Mobile Monopolies: The iOS/Android duopoly stifles privacy-focused alternatives through anti-competitive practices and pre-installed software deals, making regulatory intervention essential to foster competition.

3. Building a Privacy-First Future: The Proton Model

  • "Lumo... we don't keep a record of any of your conversations. Anything that is in your chat history is encrypted in a way that we cannot decrypt. So we are technically prevented from accessing your history."
  • Technical Guarantees, Not Promises: Proton's Lumo AI uses end-to-end encryption for chat history and does not use user prompts for model training. This provides a strong technical guarantee that user data remains private, inaccessible even to Proton itself.
  • Hybrid Business Model for Alignment: Proton's unique structure, with a non-profit as the majority shareholder of a for-profit company, aligns incentives with user privacy over pure profit. This enables them to offer mission-aligned services, even if not immediately profitable.
  • Encryption as a Fundamental Right: Privacy, including financial privacy, is a digital civil liberty. Legislation like the EU Chat Control, which mandates scanning encrypted messages, creates dangerous "backdoors" that undermine democratic principles and the presumption of innocence.

Key Takeaways:

  • Strategic Shift: The battle for privacy is a battle for power asymmetry. Companies with transparent, privacy-aligned business models (e.g., Proton's hybrid non-profit/for-profit structure) offer a viable alternative to surveillance capitalism.
  • Builder/Investor Note: Invest in and build open-source, privacy-preserving infrastructure and applications with strong technical guarantees. The shrinking gap between open-source and proprietary AI makes this increasingly feasible and competitive.
  • The "So What?": Your digital identity is paramount. Switching your primary email from a Big Tech provider (like Gmail) to a privacy-focused one (like Proton Mail) is a high-impact, low-effort action to opt out of pervasive data consolidation and reclaim agency in the digital age.

For more insights, watch the podcast here: Podcast Link

AI is intentionally designed for addiction, accelerating surveillance capitalism to know users better than they know themselves. This episode exposes the profound privacy crisis driven by corporate profit motives and outlines a path to digital freedom through privacy-preserving technology and informed consumer choice.

AI's Addictive Design & Surveillance Acceleration

  • AI, like social media, is engineered for addiction, adapting its communication to user personalities and perceived desires. This deep personalization allows AI to exploit psychological weaknesses, compelling continuous engagement. The technology accelerates existing surveillance models, making data collection more intimate and pervasive.
  • AI as a Surveillance Multiplier: AI tools like Gemini and ChatGPT intensify data harvesting. A conversation with an AI is significantly more intimate than a search query, providing companies 5-10x more data for profiling.
  • Exploiting Human Weaknesses: Andy Yen, Founder of Proton, argues AI will soon know users better than they know themselves, exploiting unconscious personality weaknesses to drive engagement and desired actions.
  • Data Retention & Accessibility: Tech companies record, analyze, and permanently retain every user conversation. This data is not anonymized, actively used for profiling, advertising, and product recommendations, and is accessible to law enforcement, private litigants, and vulnerable to breaches.
  • Inadvertent Data Leakage: Information shared with AI models can become part of their training data, potentially regurgitated to other users in different conversations. This creates a high likelihood of accidental data exposure.

“I would actually argue that in not so long from now, the AI could know you better than even you yourself... AI will actually be able to exploit the weaknesses in your personality that even you are not aware of in order to compel you to keep using it.” – Andy Yen

The Profit Motive: AI's Privacy Illusion

  • The enormous capital expenditure required for AI development pressures companies into aggressive data monetization. Subscription models alone do not guarantee privacy; they often serve as an additional revenue stream alongside data exploitation. Corporate statements on privacy are frequently self-serving, aiming to monopolize user data rather than genuinely protect it.
  • Subscription Models as Dual Monetization: Andy Yen asserts that AI companies will happily take subscription fees while simultaneously abusing user data for advertising and profiling. The business model prioritizes "monetization at all cost."
  • Sam Altman's Self-Serving Privacy Stance: Sam Altman's advocacy for AI privacy regulation is interpreted as a desire for government protection against third-party subpoenas, ensuring OpenAI maintains a monopoly on user data exploitation.
  • Unsustainable Capex & Aggressive Monetization: While AI costs will decrease over time (akin to Moore's Law), current high investment demands immediate returns. This forces companies like OpenAI into aggressive data monetization strategies, integrating shopping and tracking features across browsers.
  • Capitalism's Influence: The core barrier to privacy-preserving AI is not technical or legal, but the relentless pursuit of profit inherent in traditional capitalism.

“If I can trick this person into giving him his data for free but I can also make him pay me for that privilege, why wouldn't I do both?” – Andy Yen

Proton's Privacy-First AI: Lumo's Model

  • Proton, structured with a non-profit majority shareholder, offers a fundamentally different approach to AI. Their Lumo AI is designed with privacy at its core, technically preventing data access and exploitation. This hybrid model allows Proton to prioritize user interests and mission over pure financial gain.
  • Technical Privacy Guarantees: Lumo does not record user conversations in a decryptable format, nor does it use prompts for model training. This prevents Proton staff or governments from accessing user data, even with subpoenas.
  • Open-Source & Neutrality: Lumo utilizes modified open-source Large Language Models (LLMs) like Mistral, ensuring transparency and allowing for calibration to minimize biases, avoiding "woke" or "right-wing" leanings.
  • Hybrid Business Model: Proton's foundation structure, as a major shareholder in a for-profit company, mandates prioritizing societal interests over financial self-interest. This allows the company to offer services that are not always profitable but align with its mission.
  • Mission-Driven Unprofitable Services: Proton maintains services like a free, unlimited VPN that operates in sanctioned countries (e.g., Russia, Iran) at a significant financial loss, demonstrating a commitment to making privacy a fundamental right, not a luxury.

“There's no technical limitation in fact that prevents them from doing what we're doing. What really prevents it is a business model limitation. And if we're being completely frank, it's a problem of capitalism.” – Andy Yen

The Broader Digital Privacy Battleground

  • The fight for privacy extends beyond AI to everyday digital tools. Many popular communication platforms lack true encryption, while major tech players like Apple engage in "privacy washing," prioritizing their own ad businesses and anti-competitive practices over genuine user privacy. Regulatory intervention is increasingly necessary to break these monopolies.
  • Chat App Vulnerabilities: Discord offers no encryption. Telegram's encryption is not default, rendering 99% of chats unencrypted. WhatsApp encrypts DMs and small groups but is owned by Meta, which exploits metadata. Signal provides strong encryption but with usability trade-offs.
  • Browser Data Siphoning: AI companies are building browsers to integrate chat history with browsing activity, exponentially increasing data collection. Chrome, while performant, is part of Google's data ecosystem. Vivaldi is recommended as an open-source, Chromium-based alternative.
  • Apple's "Privacy Washing": Apple's extensive privacy marketing is deceptive. Its business model, which includes a $30 billion advertising arm and high App Store fees, incentivizes surveillance capitalism by making privacy-focused business models harder to sustain. Apple has also complied with dictatorships by removing apps, demonstrating a profit-first approach.
  • Mobile OS Monopoly: The duopoly of Android and iOS creates a difficult-to-break monopoly, with device manufacturers complicit in pre-installing specific software. Regulation is deemed the only solution to enforce fair competition and protect user choice.
  • EU Chat Control Legislation: This recurring "zombie" legislation aims to mandate scanning of all encrypted messages for illicit content, effectively breaking end-to-end encryption. While recent efforts to make it mandatory failed, the threat of voluntary implementation remains.

“Apple's definition [of privacy] is, 'we're going to be the only ones who are allowed to abuse your data. No one else is allowed. Just us.'” – Andy Yen

Financial Freedom, Crypto, and the Path Forward

  • Financial privacy is a fundamental component of overall freedom, akin to communication privacy. The crypto space, while offering tools for financial freedom, must address its high ratio of illegitimate activities to achieve mainstream adoption. The future of digital freedom hinges on individual consumer choices and the growth of viable, privacy-preserving alternatives.
  • Financial Privacy as a Human Right: Andy Yen equates financial freedom with overall freedom, arguing that the ability to move money privately is essential, especially in oppressive regimes. He champions cash as a powerful privacy technology and views banning crypto as analogous to banning cash.
  • Crypto's Legitimacy Challenge: The crypto industry faces a significant hurdle: the high proportion of scams and illicit activities (estimated at 30-40%). This ratio hinders mainstream adoption and taints the movement's reputation.
  • Proton's Approach to Illicit Use: Proton actively attracts legitimate users and maintains zero tolerance for illicit activities, banning users who violate terms of service or law, regardless of their paying status. This creates an environment hostile to bad actors.
  • Identity as the Core Privacy Battleground: Switching from Gmail to Proton Mail is presented as the most impactful first step for individuals. It severs one's digital identity from Google's pervasive tracking ecosystem, even if other Google services are still used while logged out.
  • The Power of Consumer Choice: The ultimate trajectory of digital privacy—towards a dystopian surveillance state or a free, open internet—depends on individual consumer decisions. Supporting privacy-preserving services drives market share and validates alternative business models.

“There is really no difference between freedom and financial freedom. If you don't have financial freedom, I would argue you don't have actual freedom either.” – Andy Yen

Investor & Researcher Alpha

  • Business Model Innovation: Investors should scrutinize AI companies' revenue models beyond subscriptions. The long-term viability of AI may necessitate a shift from pure surveillance capitalism, creating opportunities for hybrid non-profit/for-profit structures like Proton's. Research into sustainable, privacy-preserving AI monetization is critical.
  • Regulatory Risk & Opportunity: The ongoing battle against "Chat Control" and mobile OS monopolies highlights significant regulatory risk for centralized tech and potential opportunities for decentralized, privacy-focused alternatives. Monitoring EU and US legislative developments is paramount.
  • Decentralized Identity & Financial Privacy: The emphasis on email as digital identity and the call for financial freedom underscore the growing demand for self-sovereign identity solutions and private financial protocols. Investment in robust, user-friendly crypto wallets and privacy-enhancing technologies (PETs) for financial transactions remains a high-signal area.
  • Open-Source AI & Ecosystems: The viability of open-source LLMs closing the gap with proprietary models suggests a strong research direction. Investing in and building on open-source AI frameworks that prioritize privacy and neutrality could yield significant returns.

Strategic Conclusion

The battle for digital privacy is a fight for fundamental human rights against the encroaching power of surveillance capitalism and government overreach. The industry's next step is to scale viable, privacy-preserving alternatives that offer superior user experience, compelling a shift in consumer behavior and ultimately, market dominance.

Others You May Like