{"id":53881,"date":"2023-09-27T16:14:26","date_gmt":"2023-09-27T16:14:26","guid":{"rendered":"http:\/\/54cda5c2-ef9a-42a5-bf21-d3228435ee1d"},"modified":"2023-09-27T16:14:26","modified_gmt":"2023-09-27T16:14:26","slug":"your-bard-conversations-are-someone-elses-google-results","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/your-bard-conversations-are-someone-elses-google-results\/","title":{"rendered":"Your Bard conversations are someone else&#8217;s Google results"},"content":{"rendered":"<figure class=\"c-shortcodeImage u-clearfix c-shortcodeImage-large\">\n<div class=\"c-shortcodeImage_imageContainer\">\n<div class=\"c-shortcodeImage_image\"><picture class=\"c-cmsImage c-cmsImage_loaded\"><source media=\"(max-width: 767px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/30901238ee228ae8ff2797d3335745a5ca7db6b6\/2023\/09\/27\/84ffc44f-c4bb-4666-ad96-0b99f7525efa\/gettyimages-1426593031-copy.jpg?auto=webp&amp;width=768\" alt=\"Long exposure Closeup of using smartphone on holographic background - stock photo\"><source media=\"(max-width: 1023px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/ee51e92d0271fecb8972f344ba16dbd00329031e\/2023\/09\/27\/84ffc44f-c4bb-4666-ad96-0b99f7525efa\/gettyimages-1426593031-copy.jpg?auto=webp&amp;width=1024\" alt=\"Long exposure Closeup of using smartphone on holographic background - stock photo\"><source media=\"(max-width: 1440px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/4f19e61d68bf4529e0603100f8034356d9075a2a\/2023\/09\/27\/84ffc44f-c4bb-4666-ad96-0b99f7525efa\/gettyimages-1426593031-copy.jpg?auto=webp&amp;width=1280\" alt=\"Long exposure Closeup of using smartphone on holographic background - stock photo\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.zdnet.com\/a\/img\/resize\/4f19e61d68bf4529e0603100f8034356d9075a2a\/2023\/09\/27\/84ffc44f-c4bb-4666-ad96-0b99f7525efa\/gettyimages-1426593031-copy.jpg?auto=webp&amp;width=1280\" alt=\"Long exposure Closeup of using smartphone on holographic background - stock photo\" width=\"1280\" height=\"720\" fetchpriority=\"low\"><\/picture><\/div>\n<p> <!----><\/div>\n<p> <!----><figcaption> <span class=\"c-shortcodeImage_credit g-outer-spacing-top-xsmall u-block\">Qi Yang via Getty Images<\/span><\/figcaption><\/figure>\n<p>If I told you that your seemingly private conversations with <a href=\"https:\/\/www.zdnet.com\/article\/what-is-google-bard-heres-everything-you-need-to-know\/\" rel=\"follow\">Bard<\/a> are being indexed and appearing in Google search results, would you still use the AI chatbot? That&#8217;s exactly what&#8217;s happened, and Google is now scrambling to fix the issue.<\/p>\n<p>Users on X, formerly Twitter, shared screenshots showing links to conversations with Bard that are showing up in Google Search results.&nbsp;<\/p>\n<figure class=\"c-shortcodeTwitterTweet\">\n<div readability=\"7.0194986072423\">\n<blockquote class=\"twitter-tweet\" readability=\"7.8969359331476\">\n<p lang=\"en\" dir=\"ltr\">Haha ???? Google started to index share conversation URLs of Bard ???? don&#8217;t share any personal info with Bard in conversation, it will get indexed and may be someone will arrive on that conversation from search and see your info ????<br \/>Also Bard&#8217;s conversation URLs are ranking as\u2026 <a href=\"https:\/\/t.co\/SKGXJD9KEJ\">pic.twitter.com\/SKGXJD9KEJ<\/a><\/p>\n<p>\u2014 Gagan Ghotra (@gaganghotra_) <a href=\"https:\/\/twitter.com\/gaganghotra_\/status\/1706545667362210129?ref_src=twsrc^tfw\">September 26, 2023<\/a><\/p><\/blockquote>\n<\/div>\n<\/figure>\n<p>This appears to be unintentional, as Google only intends to allow users to create a public link to share conversations with others. Anyone with this link can see the conversation, but Google appears to be indexing them.<\/p>\n<figure class=\"c-shortcodeImage u-clearfix c-shortcodeImage-large c-shortcodeImage-hasCaption\">\n<div class=\"c-shortcodeImage_imageContainer\">\n<div class=\"c-shortcodeImage_image\"><picture class=\"c-cmsImage\"><!----> <img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/article\/your-bard-conversations-are-someone-elses-google-results\/\" alt=\"Bard links showing up in search results\" width=\"1280\" height=\"1000.6349206349206\" fetchpriority=\"low\"><\/picture><\/div>\n<\/p><\/div>\n<p> <!----><figcaption>\n<div class=\"c-shortcodeImage_caption g-inner-spacing-right-small g-color-black\" readability=\"6\">\n<div class=\"c-ShortcodeContent\" readability=\"32\">\n<p>We replicated the issue by searching&nbsp;<strong>site:bard.google.com\/share<\/strong> on Google.<\/p>\n<\/div>\n<\/div>\n<p> <span class=\"c-shortcodeImage_credit g-outer-spacing-top-xsmall u-block\">Screenshot: Maria Diaz\/ZDNET<\/span><\/figcaption><\/figure>\n<p>&#8220;Bard allows people to share chats, if they choose. We also don&#8217;t intend for these shared chats to be indexed by Google Search. We&#8217;re working on blocking them from being indexed now,&#8221; Google Search Liaison Danny Sullivan <a href=\"https:\/\/x.com\/searchliaison\/status\/1706732827705065665?s=20\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" class=\"c-regularLink\">shared on X<\/a>.&nbsp;<\/p>\n<p>At press time, users could replicate the error by typing&nbsp;<strong>site:bard.google.com\/share<\/strong> on the Google search bar and a list of chats with Bard would appear in the search results.&nbsp;<\/p>\n<p><strong>Also: <a href=\"https:\/\/www.zdnet.com\/article\/how-to-write-better-chatgpt-prompts\/\" rel=\"follow\">How to write better ChatGPT prompts for the best generative AI results<\/a><\/strong><\/p>\n<p>Though not a lot of people would think to type that into the search bar, the possibility and the fact that these chats are appearing so publicly remain. Bard is certainly not as popular as <a href=\"https:\/\/www.zdnet.com\/article\/what-is-chatgpt-and-why-does-it-matter-heres-everything-you-need-to-know\/\" rel=\"follow\">ChatGPT<\/a>, but consider how the over <a href=\"https:\/\/www.zdnet.com\/article\/chatgpt-just-became-the-fastest-growing-app-of-all-time\/\" rel=\"follow\">100 million ChatGPT users<\/a> would feel knowing that their conversations with the AI chatbot could appear in a Google search, just because they created a link of it to share with someone else.&nbsp;<\/p>\n<p>This should work as a wake-up call for users to avoid sharing private information with Bard and any other AI chatbot and heed the warnings that developers behind these generative AI tools share.<\/p>\n<p>Google Bard itself advises users not to share personally identifiable information with it if you ask whether your chats with it are private:<\/p>\n<blockquote readability=\"10\">\n<p>&#8220;Generally, your chats with me are not private. Google may collect and store your chats, and may use them to improve my performance or for other purposes. Google may also share your chats with third parties, such as researchers or partners.&#8221;<\/p>\n<\/blockquote>\n<p>Not everything should be shared on the internet, after all.&nbsp;<\/p>\n<p><strong>Also: <a href=\"https:\/\/www.zdnet.com\/article\/third-party-ai-tools-are-responsible-for-55-of-ai-failures-in-business\/\" rel=\"follow\">Third-party AI tools are responsible for 55% of AI failures in business<\/a><\/strong><\/p>\n<p>There&#8217;s no word on when this issue will be resolved, but if you&#8217;ve ever created links to Bard chats and are concerned that your chats may be indexed in search results, you can check in your Settings. Simply go to <a href=\"https:\/\/bard.google.com\/chat\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" class=\"c-regularLink\">Bard&#8217;s<\/a> site and click on<strong> Settings,<\/strong> then select&nbsp;<strong>Your Public Links<\/strong>. This will show you and let you manage all the public links you&#8217;ve created.<\/p>\n<div id=\"pinbox-54cda5c2-ef9a-42a5-bf21-d3228435ee1d\" class=\"c-shortcodePinbox-carousel\">\n<div class=\"c-listingCarouselHorizontal\">\n<h4 class=\"c-sectionHeading\">Artificial Intelligence<\/h4>\n<p> <!----> <span class=\"c-listingCarouselHorizontal_loadingIndicator\"><\/span> <\/div>\n<\/div>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/your-bard-conversations-are-someone-elses-google-results\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>You may want to watch what you discuss with Google Bard or any other AI chatbot.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-53881","post","type-post","status-publish","format-standard","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Your Bard conversations are someone else&#039;s Google results 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/your-bard-conversations-are-someone-elses-google-results\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Your Bard conversations are someone else&#039;s Google results 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/your-bard-conversations-are-someone-elses-google-results\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-09-27T16:14:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.zdnet.com\/a\/img\/resize\/4f19e61d68bf4529e0603100f8034356d9075a2a\/2023\/09\/27\/84ffc44f-c4bb-4666-ad96-0b99f7525efa\/gettyimages-1426593031-copy.jpg?auto=webp&amp;width=1280\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/your-bard-conversations-are-someone-elses-google-results\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/your-bard-conversations-are-someone-elses-google-results\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Your Bard conversations are someone else&#8217;s Google results\",\"datePublished\":\"2023-09-27T16:14:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/your-bard-conversations-are-someone-elses-google-results\\\/\"},\"wordCount\":549,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/your-bard-conversations-are-someone-elses-google-results\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/4f19e61d68bf4529e0603100f8034356d9075a2a\\\/2023\\\/09\\\/27\\\/84ffc44f-c4bb-4666-ad96-0b99f7525efa\\\/gettyimages-1426593031-copy.jpg?auto=webp&amp;width=1280\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/your-bard-conversations-are-someone-elses-google-results\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/your-bard-conversations-are-someone-elses-google-results\\\/\",\"name\":\"Your Bard conversations are someone else's Google results 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/your-bard-conversations-are-someone-elses-google-results\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/your-bard-conversations-are-someone-elses-google-results\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/4f19e61d68bf4529e0603100f8034356d9075a2a\\\/2023\\\/09\\\/27\\\/84ffc44f-c4bb-4666-ad96-0b99f7525efa\\\/gettyimages-1426593031-copy.jpg?auto=webp&amp;width=1280\",\"datePublished\":\"2023-09-27T16:14:26+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/your-bard-conversations-are-someone-elses-google-results\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/your-bard-conversations-are-someone-elses-google-results\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/your-bard-conversations-are-someone-elses-google-results\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/4f19e61d68bf4529e0603100f8034356d9075a2a\\\/2023\\\/09\\\/27\\\/84ffc44f-c4bb-4666-ad96-0b99f7525efa\\\/gettyimages-1426593031-copy.jpg?auto=webp&amp;width=1280\",\"contentUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/4f19e61d68bf4529e0603100f8034356d9075a2a\\\/2023\\\/09\\\/27\\\/84ffc44f-c4bb-4666-ad96-0b99f7525efa\\\/gettyimages-1426593031-copy.jpg?auto=webp&amp;width=1280\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/your-bard-conversations-are-someone-elses-google-results\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Your Bard conversations are someone else&#8217;s Google results\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Your Bard conversations are someone else's Google results 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/your-bard-conversations-are-someone-elses-google-results\/","og_locale":"en_US","og_type":"article","og_title":"Your Bard conversations are someone else's Google results 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/your-bard-conversations-are-someone-elses-google-results\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-09-27T16:14:26+00:00","og_image":[{"url":"https:\/\/www.zdnet.com\/a\/img\/resize\/4f19e61d68bf4529e0603100f8034356d9075a2a\/2023\/09\/27\/84ffc44f-c4bb-4666-ad96-0b99f7525efa\/gettyimages-1426593031-copy.jpg?auto=webp&amp;width=1280","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/your-bard-conversations-are-someone-elses-google-results\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/your-bard-conversations-are-someone-elses-google-results\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Your Bard conversations are someone else&#8217;s Google results","datePublished":"2023-09-27T16:14:26+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/your-bard-conversations-are-someone-elses-google-results\/"},"wordCount":549,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/your-bard-conversations-are-someone-elses-google-results\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/4f19e61d68bf4529e0603100f8034356d9075a2a\/2023\/09\/27\/84ffc44f-c4bb-4666-ad96-0b99f7525efa\/gettyimages-1426593031-copy.jpg?auto=webp&amp;width=1280","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/your-bard-conversations-are-someone-elses-google-results\/","url":"https:\/\/www.threatshub.org\/blog\/your-bard-conversations-are-someone-elses-google-results\/","name":"Your Bard conversations are someone else's Google results 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/your-bard-conversations-are-someone-elses-google-results\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/your-bard-conversations-are-someone-elses-google-results\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/4f19e61d68bf4529e0603100f8034356d9075a2a\/2023\/09\/27\/84ffc44f-c4bb-4666-ad96-0b99f7525efa\/gettyimages-1426593031-copy.jpg?auto=webp&amp;width=1280","datePublished":"2023-09-27T16:14:26+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/your-bard-conversations-are-someone-elses-google-results\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/your-bard-conversations-are-someone-elses-google-results\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/your-bard-conversations-are-someone-elses-google-results\/#primaryimage","url":"https:\/\/www.zdnet.com\/a\/img\/resize\/4f19e61d68bf4529e0603100f8034356d9075a2a\/2023\/09\/27\/84ffc44f-c4bb-4666-ad96-0b99f7525efa\/gettyimages-1426593031-copy.jpg?auto=webp&amp;width=1280","contentUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/4f19e61d68bf4529e0603100f8034356d9075a2a\/2023\/09\/27\/84ffc44f-c4bb-4666-ad96-0b99f7525efa\/gettyimages-1426593031-copy.jpg?auto=webp&amp;width=1280"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/your-bard-conversations-are-someone-elses-google-results\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Your Bard conversations are someone else&#8217;s Google results"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/53881","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=53881"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/53881\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=53881"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=53881"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=53881"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}