Enterprise-grade redaction that runs entirely on-device. Every text field, every document, every upload — scanned for personally identifiable information before it reaches the network.
Every feature designed to prevent PII from leaving your organisation — whether typed into a chat, pasted into a form, or dragged into an AI service.
Auto-redacts as you type. Intercepts Enter, form submit, and send buttons. PII is replaced with tokens before the page can dispatch.
DOCX XML replacement preserving formatting. PDF text extraction and scanned-page OCR with pixel-level black box redaction. XLSX to CSV conversion.
Tesseract.js extracts text from screenshots and photos. PII bounding boxes are mapped and covered with black rectangles. No hidden text layer.
Auto-detects 30+ AI services (ChatGPT, Claude, Gemini, Copilot, Grok). Enforces redaction before submit on all detected AI platforms.
Reads Microsoft Information Protection labels from documents. Blocks uploads of PROTECTED, SECRET, and TOP SECRET classified files outright.
Azure AI Language with OAuth2 PKCE. Native document API for server-side PDF/DOCX redaction. Managed identity for zero stored credentials.
50+ formats recognised. If it’s text-based, it’s covered.
Centrally managed configuration, Azure AD authentication, sensitivity classification enforcement, and deployment via GPO, Intune, or Google Workspace.
Push settings via Chrome managed storage. Lock specific settings with an admin-only _locked map. Users see disabled controls with an "Admin" badge.
No API keys stored anywhere. Users sign in via Azure AD popup. Short-lived tokens auto-refresh. MFA and Conditional Access policies apply.
Zero stored credentialsReads MSIP sensitivity labels from DOCX/XLSX files. Blocks PROTECTED and above from uploading to external services. Configurable blocked/warn lists.
Australian PSPF alignedAuto (local-first), AI Only, Regex Only, Hosted Only, Cloud Only. Route all traffic through your organisation’s own infrastructure if required.
5 processing modes| Classification | Gate Action | Rationale |
|---|---|---|
| UNOFFICIAL | Allow | No restrictions |
| OFFICIAL | Allow | Standard business |
| OFFICIAL: Sensitive | Warn | Caution advised |
| PROTECTED | Block | Must not leave controlled environment |
| SECRET | Block | Classified material |
| TOP SECRET | Block | Classified material |
Last updated: April 2026
Loose Lips Sink Ships ("the Extension") is a Chrome browser extension that detects and redacts personally identifiable information (PII) in text, documents, and images. This privacy policy explains what data the Extension accesses, how it is processed, and where it is stored.
Local-first by default. The Extension processes all text and documents within the browser. When using the default configuration (Auto mode with Gemini Nano and regex), no data leaves the browser. All PII detection and redaction happens on-device.
No telemetry. The Extension does not collect analytics, usage metrics, crash reports, or any form of telemetry. It does not phone home to any server.
No user tracking. The Extension does not track browsing history, page visits, or user behaviour. It does not use cookies, fingerprinting, or any tracking mechanism.
If the user or administrator explicitly configures a cloud provider, text or document content may be transmitted to:
No cloud provider is enabled by default. Users must explicitly configure endpoints and credentials before any data is transmitted externally.
chrome.storage.local (browser profile, not synced across devices).chrome.storage.local. OAuth2 tokens (Enterprise mode) are stored in chrome.storage.session (memory-only, cleared on browser close).chrome.storage.managed (read-only to the Extension).The Extension does not use any third-party analytics, advertising, or tracking services. Third-party libraries used (pdf.js, Tesseract.js) run entirely locally within the browser.
The Extension is designed for enterprise and government use. It is not directed at children under 13 and does not knowingly collect information from children.
We may update this privacy policy from time to time. Changes will be posted on this page with an updated revision date. Continued use of the Extension after changes constitutes acceptance of the updated policy.
For privacy questions or concerns, contact us via the GitHub Issues page.
Common questions about installation, configuration, and troubleshooting.
vendor/setup.sh to install Tesseract.js.chrome://flags and enable: (1) #optimization-guide-on-device-model and (2) #prompt-api-for-gemini-nano. Restart Chrome. The green dot in the extension popup confirms Nano is available.*.gov.au) or exclude sites via blacklist mode. AI Chat Guard automatically activates on 30+ detected AI services.