Patent Pending

Remove sensitive info
from documents.
In your browser.

Drop a PDF, DOCX, or paste text. AI finds names, emails, phone numbers, SSNs, and credit cards. You choose what to redact. Nothing leaves your device.

Try it now — free, no signup Who is this for?
What it does

Before

John Smith, CEO of Acme Corp, met with Dr. Sarah Chen at [email protected]. SSN: 123-45-6789. Card: 4111 1111 1111 1111.

After

[PER_REDACTED], CEO of [ORG_REDACTED], met with Dr. [PER_REDACTED] at [EMAIL_REDACTED]. SSN: [SSN_REDACTED]. Card: [CREDIT_CARD_REDACTED].

Who is this for?

Anyone who needs to share documents without sharing the sensitive parts.

🏥

Healthcare

Share patient files with researchers. Remove names, doctors, hospitals. HIPAA Safe Harbor de-identification in seconds, not hours.

⚖️

Legal

Prepare documents for discovery or opposing counsel. Strip names and locations from transcripts, contracts, case files.

👥

Human Resources

Anonymize employee complaints, performance reviews, or investigation reports before sharing with external consultants.

🏦

Finance

Remove client names, account numbers, and SSNs from financial documents before audit or regulatory submission.

🏫

Education

Anonymize student records for research or reporting. FERPA compliance without manual redaction.

🔒

Any regulated industry

If you can't send unredacted documents to the cloud, but you need AI-quality redaction — this is how.

What it detects

Person names Organizations Locations Phone numbers Social Security Numbers Credit card numbers

Under the hood

For the security team. Everything your CISO will ask about.

Zero network egress

The AI model runs locally via WebAssembly. During processing, zero outbound requests. Verify: open DevTools → Network tab.

Verifiable

End-to-end encryption

AES-256-GCM via SubtleCrypto API. Keys are non-extractable — JavaScript cannot read them. They exist only in hardware.

SubtleCrypto

Memory clearing

After every operation, plaintext is overwritten with a 3-pass NIST SP 800-88 sequence. XOR bit-difference verification confirms the wipe.

NIST SP 800-88

Tamper-evident audit

Every step — encrypt, decrypt, infer, wipe — is logged to an HMAC-SHA256 chain. Export as JSON or CSV for regulatory compliance.

HMAC-SHA256

Bounded plaintext window

Decrypted data cannot exist in memory beyond a configurable T_max. If exceeded, emergency wipe triggers automatically.

T_max enforced

Browser isolation

COOP/COEP headers prevent Spectre-class side-channel attacks. WASM runs in a sandboxed execution environment.

COOP/COEP
ENCRYPT INPUT HASH DECRYPT NER (WASM) WIPE RE-ENCRYPT OUTPUT HASH

All seven steps execute inside the browser. The model never sees a server. The audit chain records every step with cryptographic integrity.

Try it. Right now.

Paste text or drop a document. First load downloads the model (~250MB, cached after).

Initializing...
×
Drop file here — PDF, DOCX, or TXT
Annotated Text
Run NER to see results
Audit Chain
No events yet
Zero network egress — check DevTools → Network