Transparency. All artifacts that govern or have access to prompts and completions are recorded over a tamper-evidence, verifiable transparency ledger. External auditors can evaluate any Model of these artifacts and report any vulnerability to our Microsoft Bug Bounty program. With confidential computing, enterprises achieve assurance that generat