Zero-Trust Privacy Architecture

Your Legal Data
Never Touches Our Servers

A deep dive into our privacy-first architecture across all tiers. Learn how we've designed inchambers.ai so that your confidential client information stays exactly where it belongs: with you.

Core Principles

Zero-Trust by Design

We built inchambers.ai with a fundamental principle: we should never have access to your data or API keys, regardless of which tier you choose.

Client-Side Processing

All document analysis happens in your Microsoft Word instance. Your contracts never leave your computer.

Your Keys, Your Control

You bring your own API keys. They're stored in your browser or infrastructure, never on our servers.

No Sensitive Data Logging

We never log, store, or analyze your documents, prompts, or AI responses. We only track superficial usage metrics (DAU/MAU).

Privacy Across All Tiers

Every Tier is Private by Default

From our free tier to enterprise, your data privacy is never compromised. Here's exactly how each tier protects your information.

Free Tier

20 requests per week

The free tier offers two options, both completely private:

Option 1: Use Our DeepSeek Key

  • We provide a shared DeepSeek API key
  • Your documents are sent directly to DeepSeek
  • We never see your document content
  • Rate limited to 20 requests/week

Option 2: Bring Your Own Keys

  • Use your own API keys (OpenAI, Anthropic, etc.)
  • Keys stored client-side only (IndexedDB)
  • Direct connection to AI provider from your browser
  • Same 20 requests/week limit
Free Tier Architecture (Option 1: Our Key):

┌─────────────────┐
│  Your Computer  │
│                 │
│  ┌───────────┐  │      ┌──────────────┐
│  │ MS Word   │  │─────▶│  DeepSeek    │
│  │ + Add-in  │  │      │  API         │
│  └───────────┘  │◀─────│              │
│                 │      └──────────────┘
└─────────────────┘
        │
        │ (Auth Only)
        ▼
┌─────────────────┐
│ inchambers.ai   │
│ (Rate Limiting) │
└─────────────────┘

Note: We never see document content, only count requests.

Starter Tier

Unlimited requests

Personal API keys, stored securely in your browser. We never have access to your credentials.

How It Works:

  • 1. You provide your own API keys (OpenAI, Anthropic, Google, DeepSeek, etc.)
  • 2. Keys are stored in IndexedDB (browser local storage) on your machine
  • 3. Our add-in uses these keys to connect directly to AI providers
  • 4. Keys never leave your computer and never reach our servers
  • 5. Our backend only handles OAuth authentication (no admin consent required)
Starter Tier Architecture:

┌──────────────────────────────┐
│      Your Computer           │
│                              │
│  ┌────────────────────────┐  │
│  │ MS Word + Add-in       │  │
│  │                        │  │
│  │  ┌──────────────────┐  │  │      ┌─────────────┐
│  │  │  IndexedDB       │  │  │─────▶│  OpenAI     │
│  │  │  (API Keys)      │  │  │      │  Anthropic  │
│  │  └──────────────────┘  │  │◀─────│  Google     │
│  │                        │  │      │  etc.       │
│  └────────────────────────┘  │      └─────────────┘
│                              │
└──────────────────────────────┘
         │
         │ (OAuth Only - No Keys)
         ▼
┌──────────────────────────────┐
│    inchambers.ai Backend     │
│  (Authentication & Billing)  │
└──────────────────────────────┘

Note: API keys are stored locally and never transmitted to inchambers.ai

Enterprise Tier

Custom pricing - Complete infrastructure control

The ultimate privacy solution: IC Proxy runs in your infrastructure. We never see your keys or documents.

How IC Proxy Works:

  • 1. You deploy IC Proxy (our open-source gateway) in your own cloud (Azure, AWS, GCP)
  • 2. Your organization's API keys are stored in your Azure Key Vault / AWS Secrets Manager
  • 3. All AI requests go through your IC Proxy, not our servers
  • 4. You control logging, monitoring, and compliance policies
  • 5. We only provide the license validation endpoint (no data passes through us)
Enterprise Tier Architecture (IC Proxy in Your Infrastructure):

┌──────────────────────────────────────────────────────────────┐
│                  Your Organization's Cloud                   │
│                                                              │
│  ┌────────────────┐      ┌──────────────────┐              │
│  │   IC Proxy     │─────▶│   Key Vault      │              │
│  │   (Gateway)    │      │   (Your Keys)    │              │
│  └────────────────┘      └──────────────────┘              │
│         │                                                    │
│         │                                                    │
│         ▼                                                    │
│  ┌────────────────────────────────┐                        │
│  │    AI Provider APIs            │                        │
│  │    (OpenAI, Anthropic, etc.)   │                        │
│  └────────────────────────────────┘                        │
│         ▲                                                    │
└─────────┼────────────────────────────────────────────────────┘
          │
          │ (Direct API calls)
          │
┌─────────┴────────┐
│  Your Computer   │
│                  │
│  ┌────────────┐  │
│  │  MS Word   │  │
│  │  + Add-in  │  │
│  └────────────┘  │
│                  │
└──────────────────┘
          │
          │ (License validation only)
          ▼
┌──────────────────┐
│  inchambers.ai   │
│  (License Check) │
└──────────────────┘

Note: We NEVER see your documents, API keys, or AI responses.
Perfect for:
  • Law firms requiring complete data sovereignty
  • Organizations with strict compliance requirements
  • Companies needing custom rate limiting and monitoring
  • Teams that want full audit trails in their own systems
Authentication

OAuth Without Admin Consent

Our authentication system is designed to work seamlessly without requiring organization-wide administrator approval.

Individual Consent Only

Users authenticate with their Microsoft account using standard OAuth 2.0. No admin approval needed, no special permissions required.

  • Works with any Microsoft account
  • No IT department involvement
  • Instant access after sign-up

Minimal Permissions

We only request the absolute minimum permissions needed for authentication and license management.

  • Basic profile (email, name)
  • No document access permissions
  • No filesystem access

What We Store:

User Account Data:
  • Email address
  • Name (from Microsoft profile)
  • Subscription tier
  • Usage limits (request count for free tier)
Usage Analytics:
  • Daily/Monthly Active Users (DAU/MAU)
  • Feature usage timestamps
  • Request counts per user
  • Session duration metrics

Superficial metrics only - no document content or prompts

What We DON'T Store:
  • API keys (stored client-side only)
  • Document content
  • AI prompts or responses
  • Specific text or data you analyze
Technical Details

How It Actually Works

A technical breakdown of our privacy architecture for developers and security teams.

Client-Side Key Storage (Starter Tier)

Your API keys are stored in IndexedDB, a browser-based database that lives on your machine. Here's what that means:

  • Origin-isolated: Only the inchambers.ai domain can access these keys
  • Never transmitted: Keys stay on your machine, never sent to our servers
  • Encrypted at rest: Browser encrypts IndexedDB data using OS-level encryption
  • User-controlled: You can delete keys anytime from browser settings

Direct AI Provider Connections

When you use the add-in, your browser establishes a direct HTTPS connection to the AI provider:

// Simplified flow:
1. User triggers AI feature in Word
2. Add-in reads document content (client-side)
3. Add-in retrieves API key from IndexedDB (client-side)
4. Add-in makes HTTPS request to AI provider
5. AI response returned directly to add-in
6. Add-in updates document (client-side)
// inchambers.ai servers: Never involved

Enterprise IC Proxy Architecture

IC Proxy is an open-source gateway that you deploy in your own infrastructure:

  • Self-hosted: Runs in your Azure/AWS/GCP environment
  • Key management: Integrates with Azure Key Vault, AWS Secrets Manager, etc.
  • Network policies: You control IP allowlists, VPN requirements, etc.
  • Audit trails: All requests logged in your systems
  • Compliance: Meets HIPAA, SOC 2, FedRAMP requirements

Zero-Knowledge Architecture

We've designed our system so that we literally cannot access your data, even if we wanted to:

Authentication Layer:

We only validate your identity and subscription status. No data passes through this layer.

Processing Layer:

All document processing happens client-side in the Word add-in. We never receive document content.

API Layer:

Your keys connect directly to AI providers (or through your IC Proxy). We're not in the request path.

Storage Layer:

We store billing info and account metadata. No keys, no documents, no AI responses.

Comparison

How We Compare

Understanding the difference between our privacy-first approach and traditional SaaS AI tools.

Feature inchambers.ai Traditional AI SaaS
Document data sent to vendor
API keys stored on vendor servers
Client-side processing
Self-hosted proxy option
Works with any AI provider
Admin consent required Often
Complete data sovereignty

Ready to Experience True Privacy?

Start with our free tier today, no credit card required. Your data stays private from day one.

Experience True Privacy-First AI

Your API keys never leave your machine. Your documents never touch our servers. Join 2,500+ professionals who trust us.

Start Free Trial

✓ Client-side encryption ✓ Zero-knowledge architecture ✓ No data collection