Powered by the anonym.legal engine. Hosted by anonymize.solutions or deployed on your own servers. Zero-knowledge architecture ensures that sensitive data never leaves your control.
The Enterprise tier implements zero-knowledge authentication using Argon2id for key derivation and XChaCha20-Poly1305 for encryption. Your password is never transmitted to the server — not during login, not during registration, not ever.
Recovery uses BIP39 24-word mnemonic phrases, the same standard used in cryptocurrency wallets. All verification operations use constant-time comparison to prevent timing attacks.
This is the same encryption technology used by Signal and WireGuard.
E2E encryption mode adds a layer where the server detects entity positions but never accesses the actual sensitive values. All extraction, encryption, and storage of original data happens exclusively on the client.
The server analyzes the text structure and identifies the positions of sensitive entities. It returns character offsets and entity type classifications, but does not extract the values.
Using the position data from the server, the client extracts the actual sensitive values from the original text locally. The raw values never leave the client environment.
The extracted values are encrypted on the client using keys that only the client possesses. The server has no access to these encryption keys.
Encrypted token-to-original mappings are stored client-side. Only the client can decrypt these mappings to reverse the anonymization when needed.
Throughout the entire process, the server processes structure and positions but never has access to the actual sensitive content within the text.
MCP Server v2.2.0 brings anonymization directly into AI workflows using the Streamable HTTP protocol. Seven purpose-built tools allow AI assistants to analyze, anonymize, and manage sessions programmatically.
Compatible with Claude Desktop, Cursor, and VS Code. Available on Pro and Business plans with rate limits of 100 requests per minute and a maximum text size of 100KB.
The Enterprise tier combines three NLP engines for maximum language and entity coverage, including four right-to-left languages for complete multilingual support.
25 languages with statistical and transformer-based NLP models. High-performance entity recognition optimized for production throughput.
7 languages with Stanford NLP neural models. Deep linguistic analysis for complex entity detection in academic and legal text.
16 languages with cross-lingual transformer models. Multilingual entity recognition that transfers knowledge across languages.
Full bidirectional text processing for four RTL languages, ensuring accurate entity detection in Arabic, Hebrew, Persian, and Urdu documents.
Combined across all three NLP engines
People, organizations, locations, and more
Arabic, Hebrew, Persian, Urdu
spaCy, Stanza, XLM-RoBERTa
Deploy the Enterprise tier on your own servers or let us host it. Either way, the infrastructure is built on Linux with enterprise-grade failover, scaling, and monitoring capabilities.
Active-passive and active-active failover configurations. Automatic detection and switchover ensures continuity during infrastructure events.
Distribute traffic across multiple application instances using nginx or HAProxy. Session affinity and health checks ensure reliable request routing.
Horizontal scaling adds more application instances. Vertical scaling increases resources on existing nodes. Both approaches can be combined for optimal throughput.
Secure inter-node communication using WireGuard or IPsec tunnels. All internal traffic is encrypted regardless of network topology.
Streaming replication for database high availability. Automatic failover with read replicas for query distribution and data durability.
Prometheus metrics collection with Grafana visualization dashboards. Real-time alerting on system health, performance, and security events.
Deploy with Docker containers or orchestrate with Kubernetes for automated scaling, rolling updates, and service discovery.
Automated disaster recovery procedures with defined RPO and RTO targets. Regular DR testing ensures recoverability.
The Enterprise tier operates within an ISO 27001 certified information security management system, with a completed Data Protection Impact Assessment and five formal ISMS policies governing all aspects of data handling.
Four-tier incident classification with defined response times and escalation procedures. All security incidents are documented, analyzed, and reported.
| Priority | Classification |
|---|---|
| P1 | Critical — Immediate response |
| P2 | High — Urgent response |
| P3 | Medium — Standard response |
| P4 | Low — Scheduled response |
72-hour breach notification in compliance with GDPR Article 33 requirements.
On your servers or ours. Zero-knowledge architecture, E2E encryption, and ISO 27001 compliance included.