At HiddenAI, we've built security and privacy into every aspect of our application. Learn how we protect your data and ensure your privacy while using our invisible productivity tools.
HiddenAI is designed with a security-first approach. Our product helps you maintain privacy during meetings, coding interviews, and remote work sessions while also implementing robust security measures to protect your data behind the scenes. This page details our comprehensive security architecture and practices.
HiddenAI processes and stores your data locally whenever possible. Your notes, settings, and preferences never leave your device unless explicitly shared through our cloud features.
Our core invisibility technology uses Windows API redirection and desktop composition layer modifications to keep HiddenAI undetectable during screen captures.
HiddenAI implements multiple layers of data protection to ensure your information remains secure whether stored locally or processed in the cloud.
All locally stored data is protected with:
When using AI features that require cloud processing:
HiddenAI uses industry-leading encryption standards:
Data Type | Encryption Method | Key Management |
---|---|---|
Notes | AES-256-GCM | Local device key |
API Communications | TLS 1.3 | Certificate-based |
Screenshots | AES-256-CBC | Ephemeral session key |
AI Model Inputs | End-to-end encryption | Rotating keys |
HiddenAI minimizes data collection to only what's necessary for the application to function properly.
We maintain strict data retention policies to ensure your information isn't stored longer than necessary:
When using third-party AI models (OpenAI, Groq, etc.):
HiddenAI is designed to comply with major data protection regulations:
GDPR Ready
CCPA Compliant
AES-256 Encryption
SOC 2 (In Progress)
All AI queries are encrypted in transit using TLS 1.3. We process AI requests through a secure API gateway, which anonymizes requests and doesn't store your conversational history or screenshots permanently. When using your own API keys for third-party models, you maintain full control over your data according to that provider's policies.
No. Your notes are stored locally on your device and encrypted. HiddenAI employees have no access to your content. For cloud features like AI processing, we implement technical measures that prevent our team from accessing user data. Our zero-knowledge architecture means we can't see your data even if we wanted to.
HiddenAI is designed with enterprise security in mind. We offer detailed security documentation for IT administrators and are happy to complete security questionnaires for corporate deployments. Our local-first architecture means most data stays on your company devices, and we can work with enterprise customers on custom deployment options.
Our invisibility technology works at the display driver level, intercepting screen capture requests before they reach HiddenAI's window. This is done through Windows API hooks that operate with standard user privileges—we don't require administrator access or unsafe modifications to your system. The technology is designed to be undetectable but doesn't interfere with security software or monitoring tools.
We welcome security researchers to responsibly disclose any vulnerabilities discovered in our application.
Please email security@hiddenai.app with:
We commit to acknowledging reports within 48 hours and providing regular updates as we address valid security concerns. HiddenAI offers a bug bounty program for significant security findings.