{"id":54913,"date":"2023-12-21T12:01:00","date_gmt":"2023-12-21T12:01:00","guid":{"rendered":"http:\/\/12dc0ff5-4088-46a6-9950-06e1a412e2f4"},"modified":"2023-12-21T12:01:00","modified_gmt":"2023-12-21T12:01:00","slug":"what-developers-trying-out-google-gemini-should-know-about-their-data","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/what-developers-trying-out-google-gemini-should-know-about-their-data\/","title":{"rendered":"What developers trying out Google Gemini should know about their data"},"content":{"rendered":"<figure class=\"c-shortcodeImage u-clearfix c-shortcodeImage-large\">\n<div class=\"c-shortcodeImage_imageContainer\">\n<div class=\"c-shortcodeImage_image\"><picture class=\"c-cmsImage c-cmsImage_loaded\"><source media=\"(max-width: 767px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/e7653573ed5325c9714206f9553a8fdcbe37b93c\/2023\/12\/20\/30935034-d16a-47a2-86d6-1bfc2ba18796\/gettyimages-1848351879.jpg?auto=webp&amp;width=768\" alt=\"Google Gemini\"><source media=\"(max-width: 1023px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/ef1cdd9eed7b0376d83ea7187b0fe646d6fdb5d3\/2023\/12\/20\/30935034-d16a-47a2-86d6-1bfc2ba18796\/gettyimages-1848351879.jpg?auto=webp&amp;width=1024\" alt=\"Google Gemini\"><source media=\"(max-width: 1440px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/bc8f5ae63a98fb61ead752cf953df33d939ae7e6\/2023\/12\/20\/30935034-d16a-47a2-86d6-1bfc2ba18796\/gettyimages-1848351879.jpg?auto=webp&amp;width=1280\" alt=\"Google Gemini\"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/a\/img\/resize\/bc8f5ae63a98fb61ead752cf953df33d939ae7e6\/2023\/12\/20\/30935034-d16a-47a2-86d6-1bfc2ba18796\/gettyimages-1848351879.jpg?auto=webp&amp;width=1280\" alt=\"Google Gemini\" width=\"1280\" height=\"851.712\" fetchpriority=\"low\"><\/picture><\/div>\n<p> <!----><\/div>\n<p> <!----><figcaption> <span class=\"c-shortcodeImage_credit g-outer-spacing-top-xsmall u-block\">Omar Marques\/SOPA Images\/LightRocket via Getty Images<\/span><\/figcaption><\/figure>\n<p>Developers who have jumped in to try out Google Gemini for free should know their data might be used to train its <a href=\"https:\/\/www.zdnet.com\/article\/what-is-generative-ai-and-why-is-it-so-popular-heres-everything-you-need-to-know\/\" rel=\"follow\">generative artificial intelligence<\/a> (AI) models, including those that power <a href=\"https:\/\/www.zdnet.com\/article\/google-makes-gemini-pro-available-in-ai-studio-vertex-ai-tools\/\" rel=\"follow\">Google AI Studio<\/a> and <a href=\"https:\/\/www.zdnet.com\/article\/what-is-google-gemini\/\" rel=\"follow\">Gemini Pro<\/a>.&nbsp;<\/p>\n<p>The tech giant last week made <a href=\"https:\/\/www.zdnet.com\/article\/google-makes-gemini-pro-available-in-ai-studio-vertex-ai-tools\/\" rel=\"follow\">Gemini Pro available<\/a> to developers and businesses that are keen to build their own applications using its generative AI model. Developers can access the model via the Gemini API in Google AI Studio, while organizations will have to do so via Google Cloud&#8217;s machine learning and development platform, <a href=\"https:\/\/www.zdnet.com\/article\/google-updates-vector-ai-to-let-enterprises-train-genai-on-their-own-data\/\" rel=\"follow\">Vertex AI<\/a>.&nbsp;<\/p>\n<p><strong>Also: <a href=\"https:\/\/www.zdnet.com\/article\/ai-will-change-the-role-of-developers-forever-but-leaders-say-thats-good-news\/\" rel=\"follow\">AI will change the role of developers forever, but leaders say that&#8217;s good news<\/a><\/strong><\/p>\n<p>Developers currently have free access to Gemini Pro and Gemini Pro Vision, capped at 60 requests per minute, which Google said is suitable for most app development requirements. The Gemini Pro Vision model allows text and imagery to be accepted as input, although output remains as text.&nbsp;<\/p>\n<p><!----><\/p>\n<p>Vertex AI developers can trial both AI models, within the same cap, for free until general availability, which is expected to be early 2024.<\/p>\n<p><strong>Also:&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/how-to-use-chatgpt-to-write-code\/\" rel=\"follow\">How to use ChatGPT to write code<\/a><\/strong><\/p>\n<p>Following this date, <a href=\"https:\/\/ai.google.dev\/pricing\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" class=\"c-regularLink\">charges per 1,000 characters or per image<\/a> will apply across Google AI Studio and Vertex AI. Google said it had cut prices fourfold on input and twofold on output.&nbsp;<\/p>\n<p>Gemini Pro supports 38 languages and is available across more than 180 markets, including the Asia-Pacific region.&nbsp;<\/p>\n<p>Developers can move their AI Studio code to Vertex AI if they want a fully managed AI platform that offers more customization and Google Cloud features, including data governance and compliance, and security. &nbsp;<\/p>\n<p>Google, though, is touting AI Studio as the <a href=\"https:\/\/blog.google\/technology\/ai\/gemini-api-developers-cloud\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" class=\"c-regularLink\">fastest way to build using Gemini<\/a>. <\/p>\n<p>Developers should note that when they use the free quota of 60 requests per minute, their API and Google AI Studio input and output &#8220;may be accessible to trained reviewers&#8221;.&nbsp;<\/p>\n<p><strong>Also:<\/strong>&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/generative-ai-means-more-productivity\/\" rel=\"follow\"><strong>Generative AI means more productivity, and a likely retrenchment for software developers<\/strong><\/a><\/p>\n<p>Google told ZDNET that it uses the API inputs and outputs to improve product quality. &#8220;Human review is a necessary step of the model improvement process,&#8221; a spokesperson said.&nbsp;<\/p>\n<p>&#8220;Through review and annotation, trained reviewers help enable quality improvements of generative machine-learning models like the ones that power Google AI Studio and the Gemini Pro via the Gemini API.&#8221;<\/p>\n<p>To protect developers&#8217; privacy, Google said their data is de-identified and disassociated from their API key and Google account, which is needed to log in to Google AI Studio. This protection takes place done before the reviewers can see or annotate the data.&nbsp;<\/p>\n<p><strong>Also:&nbsp;<\/strong><a href=\"https:\/\/www.zdnet.com\/article\/ai-in-2023-a-year-of-breakthroughs-that-left-no-human-thing-unchanged\/#link=%7B%22linkText%22:%22AI%20in%202023:%20A%20year%20of%20breakthroughs%20that%20left%20no%20human%20thing%20unchanged%22,%22target%22:%22_blank%22,%22href%22:%22https:\/\/www.zdnet.com\/article\/ai-in-2023-a-year-of-breakthroughs-that-left-no-human-thing-unchanged\/%22,%22role%22:%22standard%22,%22absolute%22:%22%22%7D\" rel=\"follow\"><strong>AI in 2023: A year of breakthroughs that left no human thing unchanged<\/strong><\/a><\/p>\n<p>Google&#8217;s <a href=\"https:\/\/ai.google.dev\/terms\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" class=\"c-regularLink\">Terms of Service (ToS) for its generative AI APIs<\/a> further states that the data is used to &#8220;tune models&#8221; and may be retained in connection to the user&#8217;s tuned models &#8220;[for] re-tuning when supported models change&#8221;.&nbsp;<\/p>\n<p>The ToS states: &#8220;When you delete a tuned model, the related tuning data is also deleted.&#8221; The terms also state that users should not submit sensitive, confidential, or personal data to the AI models.&nbsp;<\/p>\n<p>Data generated from when developers use Gemini Pro via Google AI Studio might still be accessed by Google reviewers, even if the developers make the move to Vertex AI.&nbsp;<\/p>\n<p>The data generated while users were on Google AI Studio will be tapped to help improve products, the Google spokesperson told ZDNET.&nbsp;<\/p>\n<p>&#8220;This includes further model tuning and evaluations. We may also derive product insights from anonymized data to help us determine new features we want to explore adding to Google AI Studio,&#8221; they said.<\/p>\n<p><strong>Also:&nbsp;<\/strong><a href=\"https:\/\/www.zdnet.com\/article\/these-5-major-tech-advances-of-2023-were-the-biggest-game-changers\/#link=%7B%22linkText%22:%22These%205%20major%20tech%20advances%20of%202023%20were%20the%20biggest%20game-changers%22,%22target%22:%22_blank%22,%22href%22:%22https:\/\/www.zdnet.com\/article\/these-5-major-tech-advances-of-2023-were-the-biggest-game-changers\/%22,%22role%22:%22standard%22,%22absolute%22:%22%22%7D\" rel=\"follow\"><strong>These 5 major tech advances of 2023 were the biggest game-changers<\/strong><\/a><\/p>\n<p>Developers and organizations with concerns about data security, but who are still keen to build with Gemini, will probably want to do so as Google Cloud customers, as this route will give them access to Vertex AI.&nbsp;<\/p>\n<p><a href=\"https:\/\/blog.google\/technology\/ai\/gemini-api-developers-cloud\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" class=\"c-regularLink\">Google has assured<\/a> that this pathway provides &#8220;customization of Gemini with full data control&#8221;. Accessing Gemini models via Vertex Ai also allows enterprise customers to tune the models with their own data.&nbsp;<\/p>\n<p>In addition, Google says it does not train its generative AI models on inputs or outputs from its cloud customers.&nbsp;<\/p>\n<div id=\"pinbox-12dc0ff5-4088-46a6-9950-06e1a412e2f4\" class=\"c-shortcodePinbox-carousel\">\n<div class=\"c-listingCarouselHorizontal\">\n<h4 class=\"c-sectionHeading\">Artificial Intelligence<\/h4>\n<p> <!----> <span class=\"c-listingCarouselHorizontal_loadingIndicator\"><\/span> <\/div>\n<\/div>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/what-developers-trying-out-google-gemini-should-know-about-their-data\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Google says it may use data flowing through its Gemini API to improve its generative AI models, including those that power Google AI Studio and Gemini Pro.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-54913","post","type-post","status-publish","format-standard","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What developers trying out Google Gemini should know about their data 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/what-developers-trying-out-google-gemini-should-know-about-their-data\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What developers trying out Google Gemini should know about their data 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/what-developers-trying-out-google-gemini-should-know-about-their-data\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-12-21T12:01:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.zdnet.com\/a\/img\/resize\/bc8f5ae63a98fb61ead752cf953df33d939ae7e6\/2023\/12\/20\/30935034-d16a-47a2-86d6-1bfc2ba18796\/gettyimages-1848351879.jpg?auto=webp&amp;width=1280\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/what-developers-trying-out-google-gemini-should-know-about-their-data\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/what-developers-trying-out-google-gemini-should-know-about-their-data\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"What developers trying out Google Gemini should know about their data\",\"datePublished\":\"2023-12-21T12:01:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/what-developers-trying-out-google-gemini-should-know-about-their-data\\\/\"},\"wordCount\":737,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/what-developers-trying-out-google-gemini-should-know-about-their-data\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/bc8f5ae63a98fb61ead752cf953df33d939ae7e6\\\/2023\\\/12\\\/20\\\/30935034-d16a-47a2-86d6-1bfc2ba18796\\\/gettyimages-1848351879.jpg?auto=webp&amp;width=1280\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/what-developers-trying-out-google-gemini-should-know-about-their-data\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/what-developers-trying-out-google-gemini-should-know-about-their-data\\\/\",\"name\":\"What developers trying out Google Gemini should know about their data 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/what-developers-trying-out-google-gemini-should-know-about-their-data\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/what-developers-trying-out-google-gemini-should-know-about-their-data\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/bc8f5ae63a98fb61ead752cf953df33d939ae7e6\\\/2023\\\/12\\\/20\\\/30935034-d16a-47a2-86d6-1bfc2ba18796\\\/gettyimages-1848351879.jpg?auto=webp&amp;width=1280\",\"datePublished\":\"2023-12-21T12:01:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/what-developers-trying-out-google-gemini-should-know-about-their-data\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/what-developers-trying-out-google-gemini-should-know-about-their-data\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/what-developers-trying-out-google-gemini-should-know-about-their-data\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/bc8f5ae63a98fb61ead752cf953df33d939ae7e6\\\/2023\\\/12\\\/20\\\/30935034-d16a-47a2-86d6-1bfc2ba18796\\\/gettyimages-1848351879.jpg?auto=webp&amp;width=1280\",\"contentUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/bc8f5ae63a98fb61ead752cf953df33d939ae7e6\\\/2023\\\/12\\\/20\\\/30935034-d16a-47a2-86d6-1bfc2ba18796\\\/gettyimages-1848351879.jpg?auto=webp&amp;width=1280\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/what-developers-trying-out-google-gemini-should-know-about-their-data\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What developers trying out Google Gemini should know about their data\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What developers trying out Google Gemini should know about their data 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/what-developers-trying-out-google-gemini-should-know-about-their-data\/","og_locale":"en_US","og_type":"article","og_title":"What developers trying out Google Gemini should know about their data 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/what-developers-trying-out-google-gemini-should-know-about-their-data\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-12-21T12:01:00+00:00","og_image":[{"url":"https:\/\/www.zdnet.com\/a\/img\/resize\/bc8f5ae63a98fb61ead752cf953df33d939ae7e6\/2023\/12\/20\/30935034-d16a-47a2-86d6-1bfc2ba18796\/gettyimages-1848351879.jpg?auto=webp&amp;width=1280","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/what-developers-trying-out-google-gemini-should-know-about-their-data\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/what-developers-trying-out-google-gemini-should-know-about-their-data\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"What developers trying out Google Gemini should know about their data","datePublished":"2023-12-21T12:01:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/what-developers-trying-out-google-gemini-should-know-about-their-data\/"},"wordCount":737,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/what-developers-trying-out-google-gemini-should-know-about-their-data\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/bc8f5ae63a98fb61ead752cf953df33d939ae7e6\/2023\/12\/20\/30935034-d16a-47a2-86d6-1bfc2ba18796\/gettyimages-1848351879.jpg?auto=webp&amp;width=1280","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/what-developers-trying-out-google-gemini-should-know-about-their-data\/","url":"https:\/\/www.threatshub.org\/blog\/what-developers-trying-out-google-gemini-should-know-about-their-data\/","name":"What developers trying out Google Gemini should know about their data 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/what-developers-trying-out-google-gemini-should-know-about-their-data\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/what-developers-trying-out-google-gemini-should-know-about-their-data\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/bc8f5ae63a98fb61ead752cf953df33d939ae7e6\/2023\/12\/20\/30935034-d16a-47a2-86d6-1bfc2ba18796\/gettyimages-1848351879.jpg?auto=webp&amp;width=1280","datePublished":"2023-12-21T12:01:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/what-developers-trying-out-google-gemini-should-know-about-their-data\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/what-developers-trying-out-google-gemini-should-know-about-their-data\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/what-developers-trying-out-google-gemini-should-know-about-their-data\/#primaryimage","url":"https:\/\/www.zdnet.com\/a\/img\/resize\/bc8f5ae63a98fb61ead752cf953df33d939ae7e6\/2023\/12\/20\/30935034-d16a-47a2-86d6-1bfc2ba18796\/gettyimages-1848351879.jpg?auto=webp&amp;width=1280","contentUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/bc8f5ae63a98fb61ead752cf953df33d939ae7e6\/2023\/12\/20\/30935034-d16a-47a2-86d6-1bfc2ba18796\/gettyimages-1848351879.jpg?auto=webp&amp;width=1280"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/what-developers-trying-out-google-gemini-should-know-about-their-data\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"What developers trying out Google Gemini should know about their data"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/54913","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=54913"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/54913\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=54913"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=54913"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=54913"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}