Privacy Pipeline
Chain multiple privacy operations in sequence with preset workflows for maximum protection.
Category: Privacy
Processing: On-device
Quota bucket: Heavy
Open interactive tool: /tools/pipeline
How to use Privacy Pipeline
- Load a PDF and choose a preset pipeline or build a custom sequence.
- Review the step order: each step feeds its output to the next.
- Click Run Pipeline to execute all steps sequentially.
- Review the per-step report showing timing and size changes.
- Download the final output after all steps complete.
Tips
- Use the Maximum Privacy preset for the strongest protection: paranoid scrub then flatten.
- Use Safe Sharing for everyday external sharing: scrub, EXIF strip, compress.
- Custom pipelines let you chain any combination of available operations.
Privacy: Your files never leave your browser. All processing runs on-device.
Full privacy model
Frequently asked questions
What does Privacy Pipeline change?
It chains multiple PDF privacy operations in sequence, piping output from one step to the next.
Is Privacy Pipeline private by default?
All operations run locally in your browser. No data leaves your device.
What does Privacy Pipeline not protect?
It cannot undo individual steps once the pipeline has run.
Limitations
- Pipeline execution is sequential. Total time is the sum of all steps.
- Redaction step requires pre-marked redaction rectangles.
- Some step combinations may increase file size (e.g., flatten after compress).
Related tools
Remove Metadata from PDF
Strip metadata, forms, annotations, and risky interactive PDF elements. No upload required.
Flatten to Image PDF
Rasterize every page to destroy all hidden structure: fonts, layers, metadata, EXIF, scripts, forms.
Visual Redaction
Draw redaction boxes on pages and burn them irreversibly by rasterizing.
Forensic Analyzer
Scan a PDF for identity leaks, tracking vectors, and security risks.