Airgap Voice Logo Airgap Voice
Home Support

Privacy Policy

Effective Date: 2026-02-04

1. Introduction

Airgap Voice ("the Application") is built on a "Zero-Knowledge" and "Local-First" architecture.

This Privacy Policy explains how Airgap Voice handles your data. In summary: We do not collect, store, transmit, or have access to your data. The Application operates entirely offline and only processes data locally on your device.

2. No Data Collection ("Zero-Data" Policy)

We explicitly strictly adhere to a Zero-Data policy:

  • No Personal Information: We do not collect names, email addresses, IP addresses, or device identifiers.
  • No Usage Analytics: We do not track how you use the Application, which buttons you click, or how long you use it.
  • No Crash Reports: We do not automatically collect crash logs.
  • No Third-Party Trackers: The Application contains no third-party data collection SDKs, tracking pixels, or advertising frameworks.

3. Data Processing and Storage

3.1 Local On-Device Processing

All voice processing, transcription, and text generation are performed locally on your Mac using embedded AI models and Apple's Metal framework running on modern Apple Silicon Hardware. Your audio data never leaves your device.

3.2 Volatile Memory Usage

The Application processes audio and text primarily in volatile memory (RAM).

  • Audio: Audio is captured, processed into text, and immediately discarded from memory. It is never saved to a file on your disk by the Application.
  • Transcripts: Transcripts are generated in memory and injected directly into your target application via Accessibility APIs. The Application does not save a history of transcripts to your disk.

3.3 Memory Zeroization (No Residual Data)

Airgap Voice implements aggressive memory zeroization which provides a critical security guarantee:

  • Immediate Secure Clearing: When audio buffers, speech tokens, or transcripts are no longer needed, they are overwritten with zeros (`0x00`) before the memory is released.
  • No Residual Memory Traces: Unlike normal memory deallocation (where data may linger until the OS overwrites it), zeroization ensures sensitive data cannot be recovered—even by memory forensics tools, cold boot attacks, or malicious processes scanning freed memory.
  • Defense in Depth: Combined with Apple Silicon's hardware memory encryption, this means your voice data exists only momentarily during active processing and leaves no exploitable traces.

This means it is technically impossible to capture residual audio or transcript data from memory after processing completes.

3.4 No Cloud Connection

The Application is sandboxed with Network Access disabled. Therefore, it is technically impossible for the Application to transmit data to us or any third party.

3.5 No Local User Data Storage

The application stores application specific settings such as the selected microphone or the specific keyboard shortcut to toggle transcription on and off. The application does not store any user related data such as transcripts, logs or anything else on the local drive.

4. Permissions

The Application requests specific permissions strictly to function:

4.1 Microphone Access

  • Purpose: To capture audio for real-time transcription.
  • Scope: The microphone is active only when you explicitly toggle the "Record" state. The Application does not listen in the background.

4.2 Accessibility (Accessibility API)

  • Purpose: To insert the transcribed text into the text field of the active window where your cursor is located.
  • Scope: We use this permission solely for text injection. We do not read the screen, log keystrokes, or monitor other applications. This is technically impossible because Network Access is disabled and the application has no access to screen recording or keyboard logging.

5. Data Sovereignty

Because the Application operates offline without a central server:

  • You represent the sole custodian of your data.
  • We (the developers) have no technical means to access your data, and therefore cannot comply with any third-party requests (legal or otherwise) to provide your data, as we do not possess it.

6. Encryption

Airgap Voice leverages the underlying FIPS 140-2 Validated CoreCrypto module provided by macOS for all platform-level encryption. This includes full-disk encryption and hardware-level memory encryption enforced by the Apple Silicon Secure Enclave.

7. Children’s Privacy (COPPA)

The Application does not collect data from children, because it collects no data at all.

8. Changes to This Policy

We may update our Privacy Policy from time to time. Since we have no way to contact you, we advise you to review this page periodically for any changes. Continued use of the Application signifies acceptance of the updated policy.

9. Contact Us

If you have questions about this architecture or policy, please contact us at:

support@airgapvoice.com

Privacy Policy Terms of Service Report an Issue

© 2026 Airgap Voice. All rights reserved.