Your email is never stored or retained.
Most security tools store your email on their servers. We don't. Here is exactly how your data flows, what we retain (almost nothing), and the commitment we make to your privacy.
How your data flows
From inbox to protection in 5 steps
Email arrives
In Gmail or Outlook, like normal.
Read on your device
In your browser, phone, or desktop app. Not on a server.
Analyzed on Ṣọ servers
Sent to our secure infrastructure for threat analysis. Deleted immediately after.
Result shown to you
Safe or risky, with a plain-language reason.
Nothing retained
Never stored, shared, or used for training.
What leaves your device
A complete list of what we send and what we retain. If it is not here, it is never stored.
- Your email address (for login only)
- Anonymized threat patterns (no personal content)
- Breach scan requests (just the email, never passwords)
- Email content stored or retained after analysisNEVER
- Contact lists, calendar events, or filesNEVER
- Meeting audio, video, or transcriptsNEVER
Verify it yourself
Email content is processed in memory on our secure servers and never written to persistent storage. You can verify what we retain in our data retention table — your email content does not appear there.
Meeting security (deepfake detection, transcription) runs locally in your browser via WebAssembly. Email threat analysis runs on our secure servers with zero retention.
How we compare
Other tools need your email. We don't.
IRONSCALES, Barracuda, Abnormal, and most enterprise tools route your email through their cloud to scan it.
Available everywhere
Feature availability by platform
Some features require browser-level access and are only available on the Chrome extension. Core protection works across all platforms.
| Feature | Extension | Mobile | Desktop |
|---|---|---|---|
| Email threat scanning | |||
| Phishing and spoofing detection | |||
| Link and attachment analysis | |||
| Email categorization | |||
| Dark web breach monitoring | |||
| Breach alert emails | |||
| Suggested replies | |||
| Inline threat banners in Gmail/Outlook | |||
| Email tracker blocking | |||
| Audio deepfake detection | - | - | |
| Video deepfake detection | - | - | |
| Live meeting transcription | - | - | |
| VPN / datacenter detection | - | - | |
| Post-meeting recap | - | - | |
| Calendar integration | - | ||
| Snooze and scheduled send | - |
Compliance
Standards we meet
Google CASA Verified
Passed Google's Cloud Application Security Assessment for Workspace API access.
GDPR Compliant
European privacy standards. Data minimization. Right to access, correct, and delete.
Zero-Retention Architecture
Email content is processed in memory on our servers, never written to disk. Never read by humans.
Encrypted in Transit
All data transmitted between your device and our servers uses TLS encryption.