Privacy You Can Verify
Designed for confidential work: runs offline, avoids background uploads, and keeps you in control. Below are simple checks you can run yourself.
Proof You Can Run
Two quick checks designed for regulated professionals—no “trust us” required.
The Airplane Mode Test
During the pilot, this is the first demo we run. If it works offline, your data stayed on your desk.
- Put your laptop in airplane mode (and/or unplug Ethernet).
- Connect Inteligentia via USB‑C and plug in the power adapter.
- Open the companion app and load a confidential document set.
- Ask a question and verify sources via clickable citations.
Goal: demonstrate no dependency on internet-hosted inference endpoints by our system. This does not assert the host computer is malware-free.
The Privacy Card Checklist
A short checklist you can run, repeat, and share internally.
- Isolate host: disable Wi‑Fi and unplug Ethernet.
- Verify isolation: confirm no internet access.
- Connect device: USB‑C for data + separate power.
- Run workflow: ingest → search → summarize → draft.
- Result: workflow runs end‑to‑end without internet.
Privacy by Architecture
The safest data leak is the one that can’t happen. We minimize risk by removing network paths.
No Wi‑Fi, No Bluetooth, No Ethernet
The appliance is built to work offline. There’s no networking hardware inside it, so it can’t upload client files in the background.
USB‑C for Data, Separate Power
The only way to exchange data is via USB‑C when you connect the device to your computer.
- Open and search your documents
- Show citations and drafts
- Install verified updates
Power comes from a separate adapter, so you always know what cable does what.
Chain of Custody
Devices are prepared and sealed under controlled handling in Romania before pilot distribution.
Data Protection
Simple defaults: your work stays local, protected by encryption and your device password.
Encrypted Storage
Data on the device is encrypted at rest. Without your password, it’s unreadable even if someone steals the hardware.
No Accounts
There’s no cloud login, no email verification, and no subscription gate. You set a device password locally and you’re ready to work.
Security Team Details
If you need deeper implementation details (encryption, tamper handling, update verification, reproducible builds), see the technical notes on the Investors page.
Zero Telemetry
We don’t collect usage data. The design minimizes data transfer risk.
No Background Uploads
The device is designed to work offline and has no networking hardware. It can’t “phone home” or upload documents in the background.
No Usage Analytics
We don’t track your documents, your questions, or your usage patterns.
If you can run the workflow in airplane mode, you can be confident it’s not dependent on cloud services.
Secure Updates
Updates happen via USB so the device doesn’t need internet access.
Verified Updates via USB
When you choose to update:
- Your companion app downloads the update package while you’re online
- The update is verified before installation
- The device installs the update over USB
The device itself never needs an internet connection.
No Kill Switch
If you decline updates, the device continues to function on its last installed version. There's no activation server, no license check, no remote lockout.
You own the device and the intelligence it contains.
Compliance Posture
Designed to keep confidential processing local and reduce unnecessary data transfer.
Designed for Confidential Work
- Your documents stay local
- No cloud accounts required
- Less vendor paperwork just to use AI
Note: Inteligentia supports compliance; your obligations still depend on your use case and jurisdiction.
Need a deeper review?
If you’re evaluating this with an internal security team, we can walk through the offline proof protocol and share implementation details during the pilot.
For technical notes (encryption details, update signing, reproducible builds), see Investors → Security.
Questions About Security?
We're happy to discuss our security architecture in detail with prospective customers and their security teams.
Contact Our Team