The Magical World of LLMs: Key Component Cheatsheet and Why the Location of Key Components Is Crucial for Data Security