Privacy Policy
Effective Date: 2026-02-04
1. Introduction
Airgap Voice ("the Application") is built on a "Zero-Knowledge" and "Local-First" architecture.
This Privacy Policy explains how Airgap Voice handles your data. In summary: We do not collect,
store, transmit, or have access to your data. The Application operates entirely offline and
only processes data locally on your device.
2. No Data Collection ("Zero-Data" Policy)
We explicitly strictly adhere to a Zero-Data policy:
- No Personal Information: We do not collect names, email addresses, IP addresses, or
device identifiers.
- No Usage Analytics: We do not track how you use the Application, which buttons you
click, or how long you use it.
- No Crash Reports: We do not automatically collect crash logs.
- No Third-Party Trackers: The Application contains no third-party data collection SDKs,
tracking pixels, or advertising frameworks.
3. Data Processing and Storage
3.1 Local On-Device Processing
All voice processing, transcription, and text generation are performed locally on your Mac using embedded AI
models and Apple's Metal framework running on modern Apple Silicon Hardware. Your audio data never
leaves your device.
3.2 Volatile Memory Usage
The Application processes audio and text primarily in volatile memory (RAM).
- Audio: Audio is captured, processed into text, and immediately discarded from memory.
It is never saved to a file on your disk by the Application.
- Transcripts: Transcripts are generated in memory and injected directly into your target
application via Accessibility APIs. The Application does not save a history of transcripts to your disk.
3.3 Memory Zeroization (No Residual Data)
Airgap Voice implements aggressive memory zeroization which provides a critical security
guarantee:
- Immediate Secure Clearing: When audio buffers, speech tokens, or transcripts are no
longer needed, they are overwritten with zeros (`0x00`) before the memory is released.
- No Residual Memory Traces: Unlike normal memory deallocation (where data may linger
until the OS overwrites it), zeroization ensures sensitive data cannot be recovered—even by memory
forensics tools, cold boot attacks, or malicious processes scanning freed memory.
- Defense in Depth: Combined with Apple Silicon's hardware memory encryption, this means
your voice data exists only momentarily during active processing and leaves no exploitable traces.
This means it is technically impossible to capture residual audio or transcript data from
memory after processing completes.
3.4 No Cloud Connection
The Application is sandboxed with Network Access disabled. Therefore, it is technically
impossible for the Application to transmit data to us or any third party.
3.5 No Local User Data Storage
The application stores application specific settings such as the selected microphone or the specific keyboard
shortcut to toggle transcription on and off. The application does not store any user related data such as
transcripts, logs or anything else on the local drive.
4. Permissions
The Application requests specific permissions strictly to function:
4.1 Microphone Access
- Purpose: To capture audio for real-time transcription.
- Scope: The microphone is active only when you explicitly toggle the "Record"
state. The Application does not listen in the background.
4.2 Accessibility (Accessibility API)
- Purpose: To insert the transcribed text into the text field of the active window where
your cursor is located.
- Scope: We use this permission solely for text injection. We do not read the screen, log
keystrokes, or monitor other applications. This is technically impossible because Network Access
is disabled and the application has no access to screen recording or keyboard logging.
5. Data Sovereignty
Because the Application operates offline without a central server:
- You represent the sole custodian of your data.
- We (the developers) have no technical means to access your data, and therefore cannot comply with any
third-party requests (legal or otherwise) to provide your data, as we do not possess it.
6. Encryption
Airgap Voice leverages the underlying FIPS 140-2 Validated CoreCrypto module provided by macOS for all
platform-level encryption. This includes full-disk encryption and hardware-level memory encryption enforced
by the Apple Silicon Secure Enclave.
7. Children’s Privacy (COPPA)
The Application does not collect data from children, because it collects no data at all.
8. Changes to This Policy
We may update our Privacy Policy from time to time. Since we have no way to contact you, we advise you to
review this page periodically for any changes. Continued use of the Application signifies acceptance of the
updated policy.
9. Contact Us
If you have questions about this architecture or policy, please contact us at:
support@airgapvoice.com