yPersonas
talking to karl
Imagine having the legendary Karl Lagerfeld as your fashion advisor. Karl’s Yp is not just a source of fashion tips but an evolving companion who understands your style and preferences.
Get Karl to choose the perfect outfit for the day based on your plans and schedule or your party outfit for Saturday evening. Upload photos of your wardrobe and accessories. Karl learns from you; he gets to know you from your social life, your friends, and everything. You can ask him to put together your outfits or talk to him about fashion, life, or how to build a successful business. He can pick staff for you to buy online, or you can give him a budget and let him shop for you.
And there is so much more. You can combine multiple yPs and talk to all of them, or even make them talk to each other. Karl, together with a makeup artist or Aristoteles. The choice is yours.
your privacy
Our commitment to privacy is manifested through a pioneering private information access management approach. When so much information is made accessible to an AI, a system has to be implemented that enables the user's full control at any time, not only for the information he actively shares but also for everything he shared in the past.
The Private yP Clouds & Bubbles Solution
We have developed a system where all information you share is automatically classified and stored in end-to-end encrypted yP Clouds. This means that, for example, all health-related data about you are stored in your "Personal Health Bubble." When health information refers to someone else, it is stored in the "Others Health Bubble." All health bubbles are in the "Health Cloud." We have developed a key system where a long private multi-key is stored on your device only. This key enables fine-grained access to every yP Cloud & Bubble, and you can revoke access to the information you have shared anytime. This means that you can revoke the AI's access to an information Bubble or a whole area of information (Clouds), and everything contained becomes opaque to the AI instantaneously. The AI forgets everything derived from its access to the information it does not have access to anymore. This happens through the revocation of a specific part of the multi-key. Every time the AI requires access to information, it needs to use the private key stored on your device to decrypt the data. Even the results produced by the AI based on your shared information are encrypted with your private key, thus, not having access to the key makes everything encrypted with the key unreadable.
The classification of your supplied information happens automatically, but you also can direct the AI to create new Info Bubbles, store information in specific Bubbles, or shift information from one Bubble to another. You also have instant access to a report with every information stored in as much detail as you want. Further, through end-end encryption, no one else can access your private information.
If your device containing your private key is stolen, you can access our systems emergency center from anywhere and enable an emergency lockdown, temporarily or permanently preventing any access to information from your device.
The user-controlled private key mechanism is at the core of our AI system's security and privacy architecture, ensuring that your personal information remains always under your control.
yPersonas
talking to karl
Imagine having the legendary Karl Lagerfeld as your fashion advisor. Karl’s Yp is not just a source of fashion tips but an evolving companion who understands your style and preferences.
Get Karl to choose the perfect outfit for the day based on your plans and schedule or your party outfit for Saturday evening. Upload photos of your wardrobe and accessories. Karl learns from you; he gets to know you from your social life, your friends, and everything. You can ask him to put together your outfits or talk to him about fashion, life, or how to build a successful business. He can pick staff for you to buy online, or you can give him a budget and let him shop for you.
And there is so much more. You can combine multiple yPs and talk to all of them, or even make them talk to each other. Karl, together with a makeup artist or Aristoteles. The choice is yours.
your privacy
Our commitment to privacy is manifested through a pioneering private information access management approach. When so much information is made accessible to an AI, a system has to be implemented that enables the user's full control at any time, not only for the information he actively shares but also for everything he shared in the past.
The Private yP Clouds & Bubbles Solution
We have developed a system where all information you share is automatically classified and stored in end-to-end encrypted yP Clouds. This means that, for example, all health-related data about you are stored in your "Personal Health Bubble." When health information refers to someone else, it is stored in the "Others Health Bubble." All health bubbles are in the "Health Cloud." We have developed a key system where a long private multi-key is stored on your device only. This key enables fine-grained access to every yP Cloud & Bubble, and you can revoke access to the information you have shared anytime. This means that you can revoke the AI's access to an information Bubble or a whole area of information (Clouds), and everything contained becomes opaque to the AI instantaneously. The AI forgets everything derived from its access to the information it does not have access to anymore. This happens through the revocation of a specific part of the multi-key. Every time the AI requires access to information, it needs to use the private key stored on your device to decrypt the data. Even the results produced by the AI based on your shared information are encrypted with your private key, thus, not having access to the key makes everything encrypted with the key unreadable.
The classification of your supplied information happens automatically, but you also can direct the AI to create new Info Bubbles, store information in specific Bubbles, or shift information from one Bubble to another. You also have instant access to a report with every information stored in as much detail as you want. Further, through end-end encryption, no one else can access your private information.
If your device containing your private key is stolen, you can access our systems emergency center from anywhere and enable an emergency lockdown, temporarily or permanently preventing any access to information from your device.
The user-controlled private key mechanism is at the core of our AI system's security and privacy architecture, ensuring that your personal information remains always under your control.