Aletheia

Privacy

This product holds the most sensitive content you will ever produce. The architecture is built around that fact rather than apologizing for it afterward.

How your words are kept

01

On your device

Your voice is encrypted before it leaves the browser, with a key derived from your vault passphrase. The plaintext audio never travels.

02

In transit and at rest

We receive ciphertext. The audio key is also wrapped under recovery codes only you hold, so no one here can play your recordings back.

03

When the model reads

Transcripts are decrypted briefly inside an isolated function to be processed, then that memory is wiped. Every such access is written to your audit log.

This is operational privacy, stated honestly: no one at the company can read your content in the ordinary course of operation, every access is logged where you can see it, and the full architecture is documented. It is not a claim that decryption is technically impossible for us; it is a claim about what we have built so that it does not happen.

What we cannot do, and what we will not

Your audio is encrypted on your device under your vault passphrase and wrapped again under recovery codes only you hold. No one here can play it back. Your vault passphrase cannot be reset by us; if you forget it, your printed recovery codes are the only way back to your audio, and we say so plainly before you ever rely on it. Transcripts and the writing built from them are encrypted at rest and processed only briefly, in isolation, with every access written to an audit log you can read. Nothing you produce is sold, shared, or used to train anything.

Any access to your data by a person at the company requires the documented break-glass procedure: a written request from you, approval by two officers, an audit entry stating the reason, a token that expires within a day, and an email to you. There is no quiet path around this.

Subprocessors

The services that process data on our behalf. This list is kept current.

Supabase
Primary database and authentication, US-East region
Vercel
Application hosting
Anthropic
AI processing of decrypted content, under an executed BAA
Deepgram
Speech to text for your recordings
ElevenLabs
Voice synthesis, used only in legacy and letter features
Amazon Web Services
Key management (KMS) for envelope encryption
Stripe
Subscription billing
Resend
Transactional email
Cloudflare
Network protection and rate limiting
Sentry
Error monitoring, with personal data scrubbed before it is sent

Reporting a vulnerability

If you have found a security issue, our contact and policy are published at /.well-known/security.txt. We will acknowledge your report and keep you informed.