A technical breakdown of BarZero's Zero-Trust, Zero-Knowledge data pipeline.
Traditional SaaS architectures require you to trust the vendor. By uploading data to a centralized database, you are relying on their firewall, their employees, and their access policies. At BarZero, we assume the server is always hostile. We do not want your trust; we provide cryptographic guarantees instead.
All persistent data is encrypted client-side using WebCrypto AES-256-GCM. We hold zero plaintext keys.
Active processing happens in ephemeral memory. Containers are wiped completely after every single API request.
When you run a contract analysis or legal research query, the text never touches a database. Here is the exact lifecycle of a request:
To provide a seamless experience where your recent matters and chats are available when you return, we utilize your browser's native IndexedDB. This means your data physically resides on your SSD, not in an AWS RDS instance under our control.
If you enable Cloud Sync to access your matters across different devices, we utilize an E2EE protocol.
window.crypto.subtle.To help attorneys comply with strict ethical obligations regarding unauthorized disclosure of client information (e.g., ABA Formal Opinion 512), every processing session generates a cryptographic SHA-256 Destruction Attestation Certificate. This guarantees a non-repudiable log proving that the specific session's memory boundary was destroyed.