Trust center
We treat your files like they're our own.
You shouldn't have to trust a stranger to edit a tax return. Here's exactly what happens to your PDF the moment you drop it on this site — told in plain language, not compliance-speak.
Some jobs finish on your device. Jobs that need a server step travel over an encrypted connection, get processed only for the result you asked for, and are gone from our side inside an hour. Nobody reads your file. No algorithm learns from it. No ad partner sees it. If you want the engineering detail after you read this page, the Security page has the specs a lawyer or a security review would ask for.
- What we do with your file
- When a workflow needs a server step, we receive your file over an encrypted connection, process it on a server you can't log in to, deliver you the result, and delete our copy within 60 minutes. Local drafts stay in your browser storage until you remove them. No human reads your file. No algorithm learns from it. No ad partner sees it.
- What we never do
- Sell your data. Train models on your documents. Share your files with third parties. Hold your file hostage behind a paywall. Add a watermark. Spam your email.
- If you want the technical version
- TLS 1.3 in transit. AES-256 at rest. GDPR compliant. ISO/IEC 27001 certification in progress. SOC 2 Type II on roadmap.
ISO/IEC 27001 (in progress)
GDPR compliant
TLS 1.3
Files deleted after 1 hour
No signup required
Keep reading
Your trust review is easier when you can cross-check each page. These short companion pages cover the same product boundary from different angles.
- Security practicesThe engineering detail behind this page — cipher suites, access control, audit logs, incident response, and how to report a vulnerability.
- Compliance and certificationsOur honest status on ISO/IEC 27001, GDPR, CCPA, and where SOC 2, HIPAA, and PCI stand today. No earned claims we haven't earned.