Unfamiliar with technical terms? We've got you covered.
Your data stays encrypted — even from us
Multiple layers of cryptographic keys protect your data, each governing a different scope of access. No single key unlocks everything. No single party, including us, holds the complete set. Root keys live in dedicated hardware security modules.
AI searches your data without reading it
Each knowledge store gets its own cryptographically isolated search space. AI finds what's relevant with full accuracy, but the search operates on transformed representations, not your actual content. Cross-store comparison produces only random noise.
Everything you do builds your encrypted knowledge store
Every document, note, and conversation becomes part of your encrypted knowledge store, searchable and compounding over time. When you ask a question, AI searches your transformed embeddings without decrypting anything. Only the specific items needed are decrypted in volatile memory for the duration of response generation. That working memory is then overwritten at the byte level. Your data is always stored. It's just never exposed.
Internal AI first. Anonymized when external.
Every query gets decomposed, context is gathered from your documents, conversation history, and external sources as needed. Most of the time, our internal AI handles the full response without anything leaving our environment. When complex reasoning requires an external model, explicit PII like names, birthdates, and addresses is always anonymized first. The meaning survives. The identity doesn't.
Built to Be Verified, Not Just Trusted
We don't ask you to take our word for it. The architecture is designed so that privacy properties are structural, built into the mathematics, not added as a policy layer.
Patent-Pending
Our Private by Design Retrieval-Augmented Generation architecture is the subject of a filed provisional patent application, not a marketing claim.
Hardware-Backed Keys
Your encryption keys live inside Google Cloud's FIPS 140-2 Level 3 certified hardware security modules (HSMs). Tamper-resistant chips where private keys are stored and can't be extracted without your authorization.
Auditable by Design
Every key derivation, access event, and destruction is immutably logged. Privacy isn't a promise. It's a verifiable property.
What This Means for You
These are properties of the architecture itself, not policies that can be changed.
Experience it firsthand.
See how Private by Design RAG works in practice. Join the beta and try it yourself.
What to expect from the beta?