The discussion over whether to use a “skeleton key” or “restricted access” strategy to regulate access to AI systems has taken center stage in talks about data control, privacy, and AI access control. The way we manage access to these systems has important geopolitical ramifications as AI technology develops. This article examines the many approaches […]