Names, organizations, locations, emails, phone numbers, credit cards, SSNs — detected and redacted by AI running entirely in your browser. Nothing is uploaded. Nothing is sent. Your data never leaves your device.
Cloud AI tools are fast. They're also a compliance liability.
The AI model downloads once and runs locally via WebAssembly. During processing, zero network requests are made. Verify it yourself — open DevTools → Network.
Zero egressDistilBERT NER (66M parameters) processes text in ~130ms. PDFs in under a second. Each chunk is bounded by a configurable T_max with emergency wipe on timeout.
T_max enforcedEvery operation — encrypt, decrypt, infer, wipe — is logged to a tamper-evident HMAC-SHA256 chain. Export the audit trail as JSON or CSV for compliance.
HMAC-SHA256After every operation, plaintext is overwritten using a 3-pass NIST SP 800-88 sequence. XOR bit-difference verification confirms the wipe succeeded.
NIST SP 800-88Encryption uses AES-256-GCM via the browser's SubtleCrypto API with non-extractable keys. The key exists only in hardware — JavaScript cannot read it.
SubtleCryptoAI detects names, organizations, and locations. Regex patterns catch emails, phone numbers, SSNs, credit cards, IBANs, and IP addresses. Supports PDF, DOCX, and TXT.
NER + RegexAll seven steps execute inside your browser. Encryption and decryption use the SubtleCrypto API with non-extractable keys. The NER model runs in a WebAssembly sandbox. After inference, plaintext is wiped from memory using a verified 3-pass overwrite. The audit chain records every step with cryptographic integrity.
Paste text or drop a document. First load downloads the model (~250MB, cached after).