If you use Google Chrome, there could be a hidden AI model sitting on your computer right now - and you were never asked or told about it. Google has been silently downloading Gemini Nano onto users’ devices, taking up storage, using bandwidth, and raising serious privacy questions.
In this episode, Charly covers:
✅ What Gemini Nano is and how it ended up on your device without consent
➡️ How Google profiled your hardware before deciding to push the download
⚡ The contradiction between Google’s “local processing” claims and their general AI privacy policies
⭐ Why having an AI model sitting alongside your personal and business data is a real concern
Your computer, your data, your choice. If Google will install AI without telling you, it is time to ask what else they are doing with your information.
Alexander Hanf’s full forensic analysis: https://www.thatprivacyguy.com/blog/chrome-silent-nano-install/
HOW TO CHECK AND REMOVE GEMINI NANO
BACK UP FIRST
1. Check whether the model is on your machine.
On Windows, open File Explorer and navigate to your AppData, then Local, then Google, then Chrome, then User Data. Look for a folder called OptGuideOnDeviceModel. If it is there and it contains a file around four gigabytes, you have it. On a Mac, check your Chrome profile directory for the same folder name.
2. To stop Chrome from downloading it again, you need to open Chrome and type chrome://flags into the address bar. Search for “Optimization Guide On Device Model” and set it to Disabled.
3. Restart Chrome, then go and delete the folder from Step 1.
On Windows, there is also a registry change you can make that blocks the download permanently through a policy setting, which is more reliable than the flags method. If you are not comfortable making registry changes yourself, ask someone who is - this is not something to guess at.
Book a Free 30 minute Breakthrough Session: https://askcharlyleetham.com/book-me
(1 per person only)
Follow us:
Locals: https://askcharlyleetham.locals.com
Rumble: https://rumble.com/askcharlyleetham
Odyssey: https://odysee.com/@askcharlyleetham:4
YouTube: https://youtube.com/askcharlyleetham
Facebook: https://www.facebook.com/askcharlyleetham
Twitter: https://twitter.com/yourbizmgr
Instagram: https://instagram.com/ask_charly_leetham
LinkedIn: www.linkedin.com/in/charlyleetham
LinkedIn Company: https://www.linkedin.com/company/ask-charly-leetham/
Spotify: https://askcharlyleetham.com/likes/rise-and-shine
Apple Podcasts: https://podcasts.apple.com/us/podcast/ask-charly-leetham-online-business-manager/id1659738721
iHeartRadio: https://www.iheart.com/podcast/269-ask-charly-leetham-online-105944212/
Amazon Music: https://music.amazon.com/podcasts/662f1e44-115d-4094-862b-efe9307e0df4/ask-charly-leetham-online-business-manager
Music and Credits to:
Paradise Found is covered under Creative Commons.
“Paradise Found”
Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0
http://creativecommons.org/licenses/by/3.0/
https://incompetech.com/music/royalty-free/licenses/
https://rumble.com/v79jzz8-why-should-chromes-silent-gemini-nano-install-concern-you-2026713.html
Life is busy and there's just so many things to remember. What tools do you use to help you keep on top of ALL the things?
Gmail Confidential Mode sounds impressive, but does it actually keep your sensitive emails private? If you send client details, contracts or personal information through Gmail, you need to understand what this feature really does and where it falls short.
In this episode, Charly covers:
✅ What Gmail Confidential Mode does and how to switch it on
➡️ How to set expiry dates and passcode protection on emails
⚡ The restrictions it places on forwarding, copying, printing and downloads
⭐ What happens when you send confidential emails to non-Gmail users
❗ The things it cannot stop, including screenshots, photos and retyping
✨ Whether it is suitable for genuinely sensitive business communications
Gmail Confidential Mode is a useful tool for limiting casual sharing, but it is not true encryption or security. Watch the walkthrough to see exactly how it works and decide if it fits your business needs.
Book a Free 30 minute Breakthrough Session: https://askcharlyleetham.com/book-me
(1 per person only)
...
Your email is the one system that controls access to everything else in your business - your bank, your website, your social media, and your cloud storage. But if it just works, you probably never think about it.
In this episode, Charly covers:
✅ Why your email is the master key to your entire business
⚡ What happens when that system gets compromised or goes down
➡️ The difference between treating email as a commodity and treating it as critical infrastructure
⭐ The mindset shift that changes how you manage, secure, and protect your inbox
✨ Questions you should be asking about access, backups, and encryption
Stop treating your email like it is just another tool and start treating it like the critical business infrastructure it actually is.
Book a Free 30 minute Breakthrough Session: https://askcharlyleetham.com/book-me
(1 per person only)
Follow us:
Locals: https://askcharlyleetham.locals.com
Rumble: https://rumble.com/askcharlyleetham
Odyssey: https://odysee.com/@askcharlyleetham:4...
Last week, half a million UK Biobank volunteers discovered their de-identified medical records listed for sale on a Chinese marketplace. No firewall was breached. No password was cracked. The data was downloaded legitimately by accredited research organisations and ended up somewhere it absolutely should not have been. This episode unpacks what the UK Biobank breach tells us about centralised data, the limits of de-identification, and why the push for mandatory digital ID should concern every business owner.
In this episode, Charly covers:
✅ What actually happened with the UK Biobank data and why it wasn't a cyber attack
➡️ Why de-identified data can still be used to identify you
⚡ How your information moves through chains of trusted partners you never agreed to
⭐ What centralised databases mean for privacy and security risk
❗ Why mandatory digital ID follows the same flawed model
✨ What business owners need to consider about tracking and customer data
Privacy isn't about having something to hide. ...