Your email never touches our servers
Most security tools need access to your email to protect it. Not this one. Here is exactly how your data flows, what leaves your device (almost nothing), and how you can prove it.
How your data flows
From inbox to protection in 5 steps
Email arrives
In Gmail or Outlook, like normal.
Read on your device
In your browser, phone, or desktop app. Not on a server.
AI analyzes on-device
Threat signals, categorization, risk score.
Result shown to you
Safe or risky, with a plain-language reason.
Nothing sent
Zero email content leaves your device. Ever.
What leaves your device
A complete list. If it is not here, it stays on your device.
- Your email address (for login only)
- Anonymized threat patterns (no personal content)
- Breach scan requests (just the email, never passwords)
- Email body, subject, or attachmentsNEVER
- Contact lists, calendar events, or filesNEVER
- Meeting audio, video, or transcriptsNEVER
Verify it yourself
Open Chrome DevTools while using the extension. Go to the Network tab. Filter by your email domain. You will see zero outbound requests containing your email content.
This works because all AI models run locally via WebAssembly. The extension does not phone home with your data.
How we compare
Other tools need your email. We don't.
IRONSCALES, Barracuda, Abnormal, and most enterprise tools route your email through their cloud to scan it.
Available everywhere
Feature availability by platform
Some features require browser-level access and are only available on the Chrome extension. Core protection works across all platforms.
| Feature | Extension | Mobile | Desktop |
|---|---|---|---|
| Email threat scanning | |||
| Phishing and spoofing detection | |||
| Link and attachment analysis | |||
| Email categorization | |||
| Dark web breach monitoring | |||
| Breach alert emails | |||
| Suggested replies | |||
| Inline threat banners in Gmail/Outlook | |||
| Email tracker blocking | |||
| Audio deepfake detection | - | - | |
| Video deepfake detection | - | - | |
| Live meeting transcription | - | - | |
| VPN / datacenter detection | - | - | |
| Post-meeting recap | - | - | |
| Calendar integration | - | ||
| Snooze and scheduled send | - |
Compliance
Standards we meet
Google CASA Verified
Passed Google's Cloud Application Security Assessment for Workspace API access.
GDPR Compliant
European privacy standards. Data minimization. Right to access, correct, and delete.
Zero-Knowledge Architecture
Email content is processed on your device. We structurally cannot read your email.
Encrypted in Transit
All data transmitted between your device and our servers uses TLS encryption.