✓ ISO/IEC 27001 ALIGNED✓ ZERO-KNOWLEDGE ARCHITECTURE✓ LOCAL-FIRST V8 SANDBOX✓ AES-GCM 256-BIT ENTROPY✓ GDPR ART. 32 COMPLIANT✓ MISSION-CRITICAL RELIABILITY
Technical Whitepaper

Privacy Architecture

An in-depth analysis of the Zero-Knowledge security model and local-first execution environment that defines the 2026 industrial standard for data privacy.

Edge-State Processing

100% of cryptographic and data operations are localized to the client hardware.

Stateless Infrastructure

Our servers act as static content delivery nodes, completely decoupled from data processing.

Visual Isolation

Input content remains within the browser's DOM and memory stack, invisible to external agents.

Asynchronous Wasm

High-performance binary execution providing native-speed processing without data transit.

1. The Zero-Knowledge Imperative

In an era of ubiquitous cloud computing, the traditional utility model has become a massive liability for enterprise security. Most "free" online tools for PDF editing, JSON formatting, or text manipulation operate on a Trust-Based Model. Users are forced to upload sensitive data—legal contracts, financial logs, proprietary code snippets—to a remote server, trusting the provider's promise that the data is encrypted at rest and deleted after use.

CorpToolset was founded on a different premise: Trust, but verify through architecture. Our platform utilizes a Zero-Knowledge Execution (ZKE) model. We don't just promise not to look at your data; we've built a system where it is physically and technically impossible for us to do so. Our servers are "Knowledge-Blind"—they deliver the logic required for processing but never participate in the processing itself.

Browser Sandboxing

We leverage the V8 JavaScript engine's isolation protocols. When you interact with a CorpToolset utility, the logic executes within a strictly governed sandbox. This environment prevents the script from making unauthorized network calls or accessing system files, ensuring your data stays within the active tab.

Volatile RAM Only

Our tools process data in-memory. We use the browser's Blob and TypedArray APIs to handle files. This data is never written to a permanent disk; it exists only in your machine's RAM during the active session. Once you close the tab or refresh the page, the data is instantly garbage-collected and erased.

2. Technical Deep-Dive: The Client-Side Engine

The technical core of CorpToolset is an asynchronous modular engine that dynamically loads utility logic as needed. For complex operations, such as PDF manipulation or high-speed text regex analysis, we employ WebAssembly (Wasm).

WebAssembly allows us to run high-performance compiled code (written in Rust or C++) at near-native speeds inside the browser. This technological shift is critical: it enables industrial-grade power that previously required server-side processing to occur locally. By moving the "Compute" to the "Data," we eliminate the Data Transit Risk that plagues 90% of current online tool providers.

Key Technical Standards:

  • Secure Contexts: Tools only execute over 256-bit SSL (HTTPS) to prevent Man-in-the-Middle (MITM) code injection.
  • Zero-Exfiltration: Content-Security-Policy (CSP) headers prevent data from being sent to third-party domains.
  • Entropy Source: We use crypto.getRandomValues() for all security-sensitive operations, drawing entropy directly from the OS-level CSPRNG.

3. Industrial Compliance: GDPR, SOC2, and Beyond

For corporate compliance officers, CorpToolset represents a breakthrough in risk mitigation. Traditional tool usage often triggers "Third-Party Data Processing" clauses, requiring extensive legal vetting and DPAs (Data Processing Agreements).

Because data never leaves the employee's browser, using CorpToolset does not constitute a "Data Transfer." The data lifecycle begins and ends within your organization's managed workstation. This makes our platform inherently compatible with:

  • GDPR (Right to Privacy)
  • CCPA (Consumer Privacy)
  • HIPAA (Healthcare Integrity)
  • SOC2 (System Controls)
  • ISO 27001 (InfoSec)
  • FISMA (Federal Systems)

4. Absolute Transparency: Verification Methods

We don't ask for your blind trust. Our architecture is Openly Verifiable. Any security researcher or technical user can verify our Zero-Knowledge claims in real-time:

  1. Network Inspection: Open Chrome/Firefox DevTools (F12) → Network Tab. Perform any tool operation. You will see zero outgoing POST or GET requests containing your input data.
  2. Source Audit: Our client-side logic is delivered as readable (minified but traceable) JavaScript. You can inspect the code to confirm the lack of exfiltration logic.
  3. Offline Capability: Once loaded, many of our tools can function without an internet connection, proving that the server is not involved in the processing cycle.

Privacy Architecture FAQ

Do you store any logs of my utility usage?

We log aggregate events for analytics (e.g., "The PDF Merger tool was opened") to improve our UX. However, we never log the contents of what was processed, filenames, or any identifiable input data. Even our analytics are anonymized.

Why do some tools require a network connection to load?

The connection is only used to download the "Logic Bundle" (the JS/Wasm code) for that specific tool. Once the code is in your browser's cache, it executes locally. We do not bundle all 300+ tools into the initial page load to ensure maximum performance.

How do you handle PDF files?

We use the pdf-lib and pdfjs engines modified for Wasm execution. These libraries allow us to parse, merge, and edit PDF structures directly in the browser's memory without any temporary server-side disk storage.

What is the difference between CorpToolset and other 'Free' tools?

Most free tools are data-harvesting machines. They provide the tool in exchange for your metadata and document content. CorpToolset is an industrial platform designed for professionals who prioritize security. Our revenue model is driven by platform support and advertising, not data resale.