{"id":20412,"date":"2026-05-19T01:43:34","date_gmt":"2026-05-19T01:43:34","guid":{"rendered":"https:\/\/www.sandbox.backupassist.com\/blog\/?p=20412"},"modified":"2026-05-20T02:09:21","modified_gmt":"2026-05-20T02:09:21","slug":"ai-data-loss-real-ai-safety-problem","status":"publish","type":"post","link":"https:\/\/www.sandbox.backupassist.com\/blog\/ai-data-loss-real-ai-safety-problem","title":{"rendered":"When &#8220;AI Safety&#8221; Means Something Completely Different"},"content":{"rendered":"\n<p>Most people, when they hear &#8220;AI safety,&#8221; are thinking about the same thing: machines going rogue and taking over the world.<\/p>\n\n\n\n<p>I want to talk about a different kind of AI risk. One that&#8217;s already happening, and can cost you with permanent data loss.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p><\/p>\n\n\n\n<p>In April 2026, <a href=\"https:\/\/www.youtube.com\/@andrew.olsson\" target=\"_blank\" rel=\"noreferrer noopener\">Andrew Olsson<\/a> \u2014 a technology commentator and YouTuber \u2014 posted a video documenting what happened when Anthropic closed his Claude account without warning. The video, titled\u00a0<em>&#8220;Anthropic Banned My Claude Account,&#8221;<\/em>\u00a0has since drawn attention from developers and IT professionals who recognise the situation as something that could easily happen to them.<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"Anthropic Banned My Claude Account\" width=\"1200\" height=\"675\" src=\"https:\/\/www.youtube.com\/embed\/03wgVlCKKVg?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>The message Andrew received said he had breached Anthropic&#8217;s terms of service \u2014 something he strongly denies. He had no prior warning. No explanation of what the alleged breach actually was. Just a locked account and a wall of silence.<\/p>\n\n\n\n<p>His chat history and project files \u2014 everything he&#8217;d built up inside Claude \u2014 were suddenly inaccessible. He lodged an appeal. Days passed. No response.<\/p>\n\n\n\n<p>He went looking for a phone number, an email address, some way to reach a human at Anthropic. There wasn&#8217;t one.<\/p>\n\n\n\n<p>He was completely stuck.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p><\/p>\n\n\n\n<p>Now, I want to be clear about what actually happened to him. It wasn&#8217;t just a denial of service. It was data loss. Those two things together are the double whammy. He lost access to the tool&nbsp;<em>and<\/em>&nbsp;he lost everything he&#8217;d stored inside it. The account closure didn&#8217;t just lock the door \u2014 it locked the door with all his work still inside.<\/p>\n\n\n\n<p>That&#8217;s what makes this different from a web service going down for an hour.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p><\/p>\n\n\n\n<p>Here&#8217;s the twist I keep coming back to.<\/p>\n\n\n\n<p>When people talk about AI risk, the assumption is always the same: the threat flows outward from AI toward us. The AI does something unexpected, something harmful, something beyond our control. That&#8217;s the direction the whole &#8220;AI safety&#8221; conversation points.<\/p>\n\n\n\n<p>But this risk runs the other way. The threat isn&#8217;t the AI going rogue. It&#8217;s you becoming dependent on the AI \u2014 and then having access stripped away through no fault of your own.<\/p>\n\n\n\n<p>Same phrase. Completely different direction.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p><\/p>\n\n\n\n<p>Let&#8217;s think about what Andrew&#8217;s situation actually required of him. The AI provider unilaterally closed his account and did so on the presumption of guilt. A large corporation can brand you guilty, and then it&#8217;s up to you to try to prove yourself innocent.<\/p>\n\n\n\n<p>This is the very opposite of one of the foundational principles of modern legal systems: the presumption of innocence. In any fair legal process, the burden of proof lies with the accuser, not the accused. You are innocent until proven guilty \u2014 and critically, you have the right to know the case against you and to contest it before an impartial party. None of that applied here.<\/p>\n\n\n\n<p>So while you are presumed guilty, it means you are denied access to all of the existing data in your account that you may have spent hundreds or thousands of hours building up. After all, the correct way to use Claude is to build up your knowledge base and put them into projects. And all of a sudden, those files are inaccessible to you.<\/p>\n\n\n\n<p>According to Andrew, he was stuck. And despite submitting the appeal form, he ended up losing hope that anything would happen.<\/p>\n\n\n\n<p>When I heard of this case, I knew the story before. Goliath Corporation won&#8217;t take care of you as a customer. So you have to take care of yourself.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p><\/p>\n\n\n\n<p>This isn&#8217;t a new lesson. The need to own your own data and keep your own backups predates AI by decades. Store your critical data on a third-party system and you are, at some level, at their mercy. Cloud storage taught us that. SaaS tools reinforced it.<\/p>\n\n\n\n<p>What&#8217;s changed is the speed and the finality. When a traditional SaaS vendor terminates an account, there&#8217;s usually a wind-down period and a data export window. AI account closures, as Andrew found out, can happen overnight with no warning and no recovery path.<\/p>\n\n\n\n<p>The lesson is the same as it&#8217;s always been. The stakes just got higher.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p><\/p>\n\n\n\n<p>I&#8217;ll be honest about my own situation here.<\/p>\n\n\n\n<p>I run a backup company. I have spent more than two decades telling people that data loss happens in ways you don&#8217;t anticipate, and that the only rational response is a backup that sits outside the system you&#8217;re trying to protect.<\/p>\n\n\n\n<p>When I came across Andrew&#8217;s video, my first thought was:&nbsp;<em>do I have a backup of my Claude project files?<\/em><\/p>\n\n\n\n<p>I didn&#8217;t.<\/p>\n\n\n\n<p>I went and did one manually this morning. There&#8217;s no automated way to do it \u2014 at least none I could find. So I exported what I could, saved it locally, and accepted that this was a gap I&#8217;d been ignoring.<\/p>\n\n\n\n<p>A manual backup is better than nothing. But it&#8217;s telling that even someone in my position hadn&#8217;t thought about this until a stranger&#8217;s bad experience showed up in my feed.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p><\/p>\n\n\n\n<p>The practical takeaway is straightforward. The data you generate inside AI tools \u2014 your project files, your curated context, your prompts \u2014 has real value. In some cases, it represents hundreds of hours of work. Treat it accordingly.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Know where your data lives inside these tools<\/li>\n\n\n\n<li>Understand what export options exist, and use them<\/li>\n\n\n\n<li>Do a backup on a schedule that reflects how much you&#8217;d actually lose if access disappeared tonight<\/li>\n<\/ul>\n\n\n\n<p>And ask the harder question: if your AI account was closed right now, with no warning and no appeal, what would you lose? If that answer makes you uncomfortable, that&#8217;s useful information.<\/p>\n\n\n\n<p>The AI companies haven&#8217;t solved this problem. Until they do, we have to solve it ourselves.<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Most people think AI safety is about rogue machines. But a more immediate risk is losing access to your AI account and the files stored inside it. After a YouTuber was locked out of Claude without warning, BackupAssist founder Linus Chang explores a different kind of AI safety problem: dependence on AI platforms that can disappear overnight.<\/p>\n","protected":false},"author":2,"featured_media":20413,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[757,22],"tags":[811,815,274,813,597,812,329,237,816,814],"class_list":["post-20412","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-resilience","category-interest","tag-ai-safety","tag-ai-tools","tag-backup-strategy","tag-claude-ai","tag-cloud-storage","tag-cybersecurity","tag-data-loss","tag-data-protection","tag-digital-resilience","tag-saas-risk"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>When &quot;AI Safety&quot; Means Something Completely Different - Cyber Resilience Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.sandbox.backupassist.com\/blog\/ai-data-loss-real-ai-safety-problem\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"When &quot;AI Safety&quot; Means Something Completely Different - Cyber Resilience Blog\" \/>\n<meta property=\"og:description\" content=\"Most people think AI safety is about rogue machines. But a more immediate risk is losing access to your AI account and the files stored inside it. After a YouTuber was locked out of Claude without warning, BackupAssist founder Linus Chang explores a different kind of AI safety problem: dependence on AI platforms that can disappear overnight.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.sandbox.backupassist.com\/blog\/ai-data-loss-real-ai-safety-problem\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Resilience Blog\" \/>\n<meta property=\"article:published_time\" content=\"2026-05-19T01:43:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-20T02:09:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2026\/05\/AI-Safety-Banner.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"912\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Linus Chang\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Linus Chang\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/ai-data-loss-real-ai-safety-problem#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/ai-data-loss-real-ai-safety-problem\"},\"author\":{\"name\":\"Linus Chang\",\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/#\/schema\/person\/523a9a01769da254de228dbd4b1328d3\"},\"headline\":\"When &#8220;AI Safety&#8221; Means Something Completely Different\",\"datePublished\":\"2026-05-19T01:43:34+00:00\",\"dateModified\":\"2026-05-20T02:09:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/ai-data-loss-real-ai-safety-problem\"},\"wordCount\":949,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/ai-data-loss-real-ai-safety-problem#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2026\/05\/AI-Safety-Banner.png\",\"keywords\":[\"AI Safety\",\"AI Tools\",\"backup strategy\",\"Claude AI\",\"Cloud Storage\",\"Cybersecurity\",\"data loss\",\"Data protection\",\"Digital Resilience\",\"SaaS Risk\"],\"articleSection\":[\"Cyber Resilience\",\"Interest\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.sandbox.backupassist.com\/blog\/ai-data-loss-real-ai-safety-problem#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/ai-data-loss-real-ai-safety-problem\",\"url\":\"https:\/\/www.sandbox.backupassist.com\/blog\/ai-data-loss-real-ai-safety-problem\",\"name\":\"When \\\"AI Safety\\\" Means Something Completely Different - Cyber Resilience Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/ai-data-loss-real-ai-safety-problem#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/ai-data-loss-real-ai-safety-problem#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2026\/05\/AI-Safety-Banner.png\",\"datePublished\":\"2026-05-19T01:43:34+00:00\",\"dateModified\":\"2026-05-20T02:09:21+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/ai-data-loss-real-ai-safety-problem#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.sandbox.backupassist.com\/blog\/ai-data-loss-real-ai-safety-problem\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/ai-data-loss-real-ai-safety-problem#primaryimage\",\"url\":\"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2026\/05\/AI-Safety-Banner.png\",\"contentUrl\":\"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2026\/05\/AI-Safety-Banner.png\",\"width\":1600,\"height\":912,\"caption\":\"AI tools can become a hidden risk when important files and project data exist only inside cloud-based AI platforms.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/ai-data-loss-real-ai-safety-problem#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.sandbox.backupassist.com\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"When &#8220;AI Safety&#8221; Means Something Completely Different\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/#website\",\"url\":\"https:\/\/www.sandbox.backupassist.com\/blog\/\",\"name\":\"Cyber Resilience Blog\",\"description\":\"Protect Your Cloud Data with BackupAssist\",\"publisher\":{\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.sandbox.backupassist.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/#organization\",\"name\":\"Cyber Resilience Blog\",\"url\":\"https:\/\/www.sandbox.backupassist.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg\",\"contentUrl\":\"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg\",\"caption\":\"Cyber Resilience Blog\"},\"image\":{\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/#\/schema\/person\/523a9a01769da254de228dbd4b1328d3\",\"name\":\"Linus Chang\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/58a69ed0d0b9928d91dec6132dccfb646cc4230839af779f185531c722b0d017?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/58a69ed0d0b9928d91dec6132dccfb646cc4230839af779f185531c722b0d017?s=96&d=mm&r=g\",\"caption\":\"Linus Chang\"},\"description\":\"*Founder &amp; Creator, BackupAssist* Linus Chang has been writing software since he was eight years old. He founded BackupAssist in 2002 \u2014 making him one of the longest-standing voices in Windows backup and data protection \u2014 and has spent the decades since talking to IT administrators around the world about what actually goes wrong, and why. His interest in data loss isn't abstract. Early in his career, he was working at the Monash University help desk when a student came in with a floppy disk that wouldn't read. They tried everything. None of their drives could read it either. The disk held her entire PhD dissertation \u2014 years of work \u2014 and it was the only copy. She broke down in tears. There was nothing he could do. Five years later, he wrote the first version of BackupAssist. Linus holds a Bachelor of Science in Computer Science and has held Microsoft Certified Solution Developer and Sun Certified Java Programmer credentials. More recently, he has completed digital forensics and cyber-security courses through the Black Hat Conference. He has spoken on information security and cryptography at Infosecurity Europe, addressed politicians and policymakers at Australian Parliament House, presented to SMB IT administrators at the IT Pro Experts Conference, and served as a guest lecturer to Cyber Security master's students at the University of Melbourne. On this blog, Linus writes about backup strategy and the technical side of cyber-resilience \u2014 drawing on 24 years of product development and direct conversation with the IT professionals BackupAssist is built for. [Connect with Linus on LinkedIn](https:\/\/www.linkedin.com\/in\/linuschang\/)\",\"url\":\"https:\/\/www.sandbox.backupassist.com\/blog\/author\/linus-chang\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"When \"AI Safety\" Means Something Completely Different - Cyber Resilience Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.sandbox.backupassist.com\/blog\/ai-data-loss-real-ai-safety-problem","og_locale":"en_US","og_type":"article","og_title":"When \"AI Safety\" Means Something Completely Different - Cyber Resilience Blog","og_description":"Most people think AI safety is about rogue machines. But a more immediate risk is losing access to your AI account and the files stored inside it. After a YouTuber was locked out of Claude without warning, BackupAssist founder Linus Chang explores a different kind of AI safety problem: dependence on AI platforms that can disappear overnight.","og_url":"https:\/\/www.sandbox.backupassist.com\/blog\/ai-data-loss-real-ai-safety-problem","og_site_name":"Cyber Resilience Blog","article_published_time":"2026-05-19T01:43:34+00:00","article_modified_time":"2026-05-20T02:09:21+00:00","og_image":[{"width":1600,"height":912,"url":"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2026\/05\/AI-Safety-Banner.png","type":"image\/png"}],"author":"Linus Chang","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Linus Chang","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.sandbox.backupassist.com\/blog\/ai-data-loss-real-ai-safety-problem#article","isPartOf":{"@id":"https:\/\/www.sandbox.backupassist.com\/blog\/ai-data-loss-real-ai-safety-problem"},"author":{"name":"Linus Chang","@id":"https:\/\/www.sandbox.backupassist.com\/blog\/#\/schema\/person\/523a9a01769da254de228dbd4b1328d3"},"headline":"When &#8220;AI Safety&#8221; Means Something Completely Different","datePublished":"2026-05-19T01:43:34+00:00","dateModified":"2026-05-20T02:09:21+00:00","mainEntityOfPage":{"@id":"https:\/\/www.sandbox.backupassist.com\/blog\/ai-data-loss-real-ai-safety-problem"},"wordCount":949,"commentCount":0,"publisher":{"@id":"https:\/\/www.sandbox.backupassist.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.sandbox.backupassist.com\/blog\/ai-data-loss-real-ai-safety-problem#primaryimage"},"thumbnailUrl":"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2026\/05\/AI-Safety-Banner.png","keywords":["AI Safety","AI Tools","backup strategy","Claude AI","Cloud Storage","Cybersecurity","data loss","Data protection","Digital Resilience","SaaS Risk"],"articleSection":["Cyber Resilience","Interest"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.sandbox.backupassist.com\/blog\/ai-data-loss-real-ai-safety-problem#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.sandbox.backupassist.com\/blog\/ai-data-loss-real-ai-safety-problem","url":"https:\/\/www.sandbox.backupassist.com\/blog\/ai-data-loss-real-ai-safety-problem","name":"When \"AI Safety\" Means Something Completely Different - Cyber Resilience Blog","isPartOf":{"@id":"https:\/\/www.sandbox.backupassist.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.sandbox.backupassist.com\/blog\/ai-data-loss-real-ai-safety-problem#primaryimage"},"image":{"@id":"https:\/\/www.sandbox.backupassist.com\/blog\/ai-data-loss-real-ai-safety-problem#primaryimage"},"thumbnailUrl":"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2026\/05\/AI-Safety-Banner.png","datePublished":"2026-05-19T01:43:34+00:00","dateModified":"2026-05-20T02:09:21+00:00","breadcrumb":{"@id":"https:\/\/www.sandbox.backupassist.com\/blog\/ai-data-loss-real-ai-safety-problem#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.sandbox.backupassist.com\/blog\/ai-data-loss-real-ai-safety-problem"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.sandbox.backupassist.com\/blog\/ai-data-loss-real-ai-safety-problem#primaryimage","url":"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2026\/05\/AI-Safety-Banner.png","contentUrl":"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2026\/05\/AI-Safety-Banner.png","width":1600,"height":912,"caption":"AI tools can become a hidden risk when important files and project data exist only inside cloud-based AI platforms."},{"@type":"BreadcrumbList","@id":"https:\/\/www.sandbox.backupassist.com\/blog\/ai-data-loss-real-ai-safety-problem#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.sandbox.backupassist.com\/blog"},{"@type":"ListItem","position":2,"name":"When &#8220;AI Safety&#8221; Means Something Completely Different"}]},{"@type":"WebSite","@id":"https:\/\/www.sandbox.backupassist.com\/blog\/#website","url":"https:\/\/www.sandbox.backupassist.com\/blog\/","name":"Cyber Resilience Blog","description":"Protect Your Cloud Data with BackupAssist","publisher":{"@id":"https:\/\/www.sandbox.backupassist.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.sandbox.backupassist.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.sandbox.backupassist.com\/blog\/#organization","name":"Cyber Resilience Blog","url":"https:\/\/www.sandbox.backupassist.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.sandbox.backupassist.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg","contentUrl":"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg","caption":"Cyber Resilience Blog"},"image":{"@id":"https:\/\/www.sandbox.backupassist.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.sandbox.backupassist.com\/blog\/#\/schema\/person\/523a9a01769da254de228dbd4b1328d3","name":"Linus Chang","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.sandbox.backupassist.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/58a69ed0d0b9928d91dec6132dccfb646cc4230839af779f185531c722b0d017?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/58a69ed0d0b9928d91dec6132dccfb646cc4230839af779f185531c722b0d017?s=96&d=mm&r=g","caption":"Linus Chang"},"description":"*Founder &amp; Creator, BackupAssist* Linus Chang has been writing software since he was eight years old. He founded BackupAssist in 2002 \u2014 making him one of the longest-standing voices in Windows backup and data protection \u2014 and has spent the decades since talking to IT administrators around the world about what actually goes wrong, and why. His interest in data loss isn't abstract. Early in his career, he was working at the Monash University help desk when a student came in with a floppy disk that wouldn't read. They tried everything. None of their drives could read it either. The disk held her entire PhD dissertation \u2014 years of work \u2014 and it was the only copy. She broke down in tears. There was nothing he could do. Five years later, he wrote the first version of BackupAssist. Linus holds a Bachelor of Science in Computer Science and has held Microsoft Certified Solution Developer and Sun Certified Java Programmer credentials. More recently, he has completed digital forensics and cyber-security courses through the Black Hat Conference. He has spoken on information security and cryptography at Infosecurity Europe, addressed politicians and policymakers at Australian Parliament House, presented to SMB IT administrators at the IT Pro Experts Conference, and served as a guest lecturer to Cyber Security master's students at the University of Melbourne. On this blog, Linus writes about backup strategy and the technical side of cyber-resilience \u2014 drawing on 24 years of product development and direct conversation with the IT professionals BackupAssist is built for. [Connect with Linus on LinkedIn](https:\/\/www.linkedin.com\/in\/linuschang\/)","url":"https:\/\/www.sandbox.backupassist.com\/blog\/author\/linus-chang"}]}},"_links":{"self":[{"href":"https:\/\/www.sandbox.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/20412","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sandbox.backupassist.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.sandbox.backupassist.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.sandbox.backupassist.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sandbox.backupassist.com\/blog\/wp-json\/wp\/v2\/comments?post=20412"}],"version-history":[{"count":8,"href":"https:\/\/www.sandbox.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/20412\/revisions"}],"predecessor-version":[{"id":20421,"href":"https:\/\/www.sandbox.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/20412\/revisions\/20421"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sandbox.backupassist.com\/blog\/wp-json\/wp\/v2\/media\/20413"}],"wp:attachment":[{"href":"https:\/\/www.sandbox.backupassist.com\/blog\/wp-json\/wp\/v2\/media?parent=20412"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.sandbox.backupassist.com\/blog\/wp-json\/wp\/v2\/categories?post=20412"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.sandbox.backupassist.com\/blog\/wp-json\/wp\/v2\/tags?post=20412"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}