Desktop App
Last Updated: 2026-02-09
The cloak.business desktop application provides a local interface for secure document processing. Documents stay on your device, and only extracted text is sent for analysis.
Table of Contents#
- Overview
- Installation
- How It Works
- Features
- Processing Documents
- Encryption Keys
- Presets
- System Requirements
Overview#
The desktop app brings cloak.business functionality to your local machine. It is designed for users who prefer a native application experience or need to process sensitive documents without uploading full files to the cloud.
Key benefits:
- Documents remain on your device -- only extracted text is sent for analysis.
- Drag-and-drop support for quick document loading.
- Encrypted local vault for storing analysis history and encryption keys.
- Full access to all anonymization methods and presets.
Installation#
- Go to cloak.business and navigate to the Downloads section.
- Download the installer for your operating system.
- Run the installer and follow the on-screen instructions.
- Launch the application and sign in with your cloak.business account.
Platform Availability#
| Platform | Installer | Requirements |
|---|---|---|
| Windows | NSIS .exe / MSI | Windows 10 x64 or later |
| macOS | Universal .dmg | macOS 10.15 (Catalina) or later, Intel + Apple Silicon |
| Linux | .AppImage / .deb | Ubuntu 22.04+ or equivalent (libwebkit2gtk-4.1-0, libssl3) |
How It Works#
The desktop app processes documents in a privacy-focused pipeline:
- Local file loading -- you select a file from your device. The file is opened and read locally.
- Text extraction -- text is extracted from the document on your machine. The original file is never uploaded.
- Analysis -- the extracted text is sent to the cloak.business analysis engine for PII detection.
- Results -- detection results are returned to your desktop app.
- Anonymization -- you choose anonymization methods and the text is anonymized.
- Reconstruction -- the anonymized text is used to reconstruct the document locally on your device.
At no point is the original document file sent to or stored on cloak.business servers.
Features#
Drag and Drop#
Drag files directly from your file explorer into the application window. Multiple files can be dropped at once for batch processing.
Supported File Formats#
| Format | Extension |
|---|---|
.pdf | |
| Word | .docx |
| Plain Text | .txt |
| CSV | .csv |
Zero-Knowledge Security#
The desktop app uses two independent encryption layers:
Layer 1 — Local Vault (AES-256-GCM) The vault stores history, API tokens, and encryption keys on your device:
- Key derived from your 24-word BIP39 recovery phrase via Argon2id (64 MB, 3 iterations)
- PIN quick-unlock: a separate Argon2id derivation (16 MB, 2 iterations) for faster access
- Encrypted with AES-256-GCM — only accessible with your recovery phrase or PIN
- If you reinstall without exporting your vault, locally-stored data is permanently lost
Layer 2 — ZK Authentication + Server Data (XChaCha20-Poly1305) When you log in, your password never leaves your device:
- Your password + email produce a deterministic Blake2b salt
- Argon2id (64 MB, 3 iterations) derives a 64-byte master key
- HKDF-Blake2b derives 6 domain-separated 32-byte keys:
auth,data-encryption,key-encryption (KEK),recovery,verification,session - Only SHA256(authKey) is sent to the server for login — never the key, never the password
- Only SHA256(sessionKey) is sent once for session binding
- Server-synced data (presets, entities) is encrypted with XChaCha20-Poly1305 using your
datakey — the server stores only ciphertext it cannot decrypt - All derived keys are zero-wiped from memory (ZeroizeOnDrop) when you log out
What the server never sees: your password, master key, or any of the 6 derived keys.
Encrypted Local Vault#
The vault stores the following data encrypted with AES-256-GCM:
- Analysis history -- past analyses saved locally for reference and deanonymization
- API token -- stored encrypted; never exposed to the UI layer
- Encryption keys -- keys used for the reversible Encrypt anonymization method
- The vault requires your recovery phrase or PIN to unlock — not your account password
All Anonymization Methods#
The desktop app supports all five anonymization methods:
- Replace, Redact, Hash, Encrypt, and Mask.
- Per-entity type configuration is available, just like the web app.
Processing Documents#
Step-by-Step#
- Open the app and sign in with your cloak.business account.
- Load a document by clicking Open File or dragging it into the window.
- Select a preset or configure entity types manually.
- Click Analyze to detect PII in the extracted text.
- Review results -- detected entities are listed with types, values, and confidence scores.
- Choose anonymization methods for each entity type or apply a global method.
- Click Anonymize to produce the anonymized output.
- Save the anonymized document to your device.
Token Usage#
The desktop app uses the same token balance as the web app. Text analysis consumes tokens based on character count. See the Token System guide for details.
Encryption Keys#
When using the Encrypt anonymization method:
- Your encryption key is stored in the local encrypted vault.
- Keys are associated with specific anonymization operations.
- You can retrieve keys later to deanonymize text.
- Back up your keys. If you lose access to the vault (e.g., by reinstalling the app without exporting keys), encrypted text cannot be recovered.
Presets#
The desktop app includes the same 220+ presets available in the web app:
- 88 country-specific presets
- 15 regional presets (EU, DACH, Nordic, APAC, MENA, etc.)
- Industry presets (GDPR, HIPAA, PCI-DSS, Finance, HR, Legal)
- Custom entity selection
Preset selection and entity configuration work identically to the web app. See Presets & Entity Configuration for details.
System Requirements#
| Requirement | Minimum |
|---|---|
| Windows | Windows 10 x64 or later |
| macOS | macOS 10.15 (Catalina) or later |
| Linux | Ubuntu 22.04+ or equivalent (libwebkit2gtk-4.1-0, libssl3) |
| RAM | 4 GB |
| Disk space | 200 MB |
| Internet | Required for PII analysis (text is sent to the cloak.business API) |
The desktop app requires an active internet connection to perform PII detection. Document loading, text extraction, vault operations, and result reconstruction all happen locally on your device.