Documentation

Complete guide to installing, configuring, and using anonym.plus.

anonym.plus User Manual

Version 8.7.6 · Last updated February 28, 2026

Overview

anonym.plus Desktop is a secure document anonymization application that detects and removes Personally Identifiable Information (PII) from documents and images. It uses a local PII detection engine (Presidio) and an encrypted vault for secure storage.

See it in action: Watch our 36 video walkthroughs covering every feature in 4 languages.

Key Benefits

  • Local PII detection engine — no cloud required for analysis
  • Military-grade encryption (AES-256-GCM) for stored data
  • Reversible encryption — encrypt PII, share documents, decrypt later
  • Support for PDF, DOCX, XLSX, TXT, CSV, JSON, XML, and images (PNG, JPG, BMP, TIFF)
  • 200+ PII entity types across all global regions
  • 121 built-in detection presets (GDPR, HIPAA, Financial, Regional, etc.)
  • Custom entity detection via regex patterns
  • 48 languages supported
  • Batch processing with parallel file handling
  • Cross-platform: Windows, macOS, Linux

System Requirements

PlatformRequirement
WindowsWindows 10 or later (x64)
macOSmacOS 10.15 (Catalina) or later
LinuxUbuntu 20.04+, Debian 11+, or equivalent
Memory4 GB RAM minimum, 8 GB recommended
Storage500 MB for installation

Installation

Windows

FormatInstructions
.exe (NSIS)Download and run the .exe setup for standard installation
.msiDownload and run the .msi installer for enterprise deployment
.zip (Portable)Download the portable .zip and extract — no installation needed

macOS

Download the .dmg file, open it, and drag the app to Applications.

Linux

FormatInstructions
.debsudo dpkg -i anonym.plus_*.deb
.AppImageMake executable: chmod +x, then run
Download the latest version from the download section on the homepage.

First Launch

When you open anonym.plus for the first time, a guided setup wizard walks you through five steps: choosing how to start, creating your secure vault, setting a PIN, activating your license, and selecting an output folder. Each step is explained below with screenshots.

Step 1: Welcome Screen

The welcome screen presents three options to get started:

Welcome screen with three options: Try Demo, Get Free Account, I have an account
Welcome screen — choose how to get started
OptionDescription
Try DemoStart a 30-minute demo session with text anonymization. No account needed — great for a quick test drive.
Get Free AccountOpens registration in your browser, then returns to set up your secure vault.
I have an accountSet up your vault and activate an existing license.

A language selector at the bottom lets you switch the UI language before proceeding. 48 languages are available.

Step 2: Recovery Phrase & Vault Creation

After choosing "Get Free Account" or "I have an account," the app generates a secure vault protected by a 24-word BIP39 recovery phrase. This phrase is the master key to your vault.

Recovery phrase displayed as 24 numbered words in a grid
Your 24-word recovery phrase — write it down and store safely
Critical: Write down all 24 words in order. This is the only way to recover your vault if you forget your PIN. The app cannot recover it for you.

You can Copy the phrase to clipboard (auto-cleared after 30 seconds) or Save as TXT to a file. Click Hide to blur the words for privacy. You must check "I have safely stored my recovery phrase" before continuing.

Verify Your Phrase

To confirm you saved the phrase correctly, the app asks you to enter 3 randomly selected words by their position number.

Verification step asking for word #4, #8, and #16
Verify 3 random words from your recovery phrase

Type the correct words and click Confirm. If any word is wrong, you'll be prompted to try again. Once verified, the vault is created and you proceed to PIN setup.

Step 3: PIN Setup

After vault creation, you can set a 4–8 digit PIN for quick daily access. The PIN lets you unlock the app without typing all 24 words each time.

PIN setup form with Create PIN and Confirm PIN fields
Set a PIN for quick daily unlock
  • Quick unlock without typing your full 24-word recovery phrase
  • Your recovery phrase remains stored securely in the vault
  • You can always use the recovery phrase if you forget your PIN

Enter your PIN in both fields and click Set PIN & Continue. You can also click Skip for now to set a PIN later in Settings → Security.

Step 4: License Activation

With your vault ready, the final security step is activating your anonym.plus license to unlock all features.

License activation form with email and password fields
Sign in with your anonym.plus account to activate

Enter your email and password, then click Sign In & Activate. Your password is hashed locally and never sent to the server in plain text.

Manual Activation

If sign-in doesn't work (e.g., behind a corporate firewall), expand Manual activation (paste or import file) for alternative methods:

Manual activation panel with paste field and Import File button
Manual activation — paste a license key or import a license file
  • Paste license key — paste the JSON license key from your account page
  • Import File — import a .json license file downloaded from your account

You can also click Skip for now to activate later via Settings → Account.

Step 5: Output Folder

The last step lets you choose where anonymized documents will be saved.

Output folder selection with Browse button and default path
Choose where to save anonymized documents

The default folder is Documents/CloakBusiness. Click Browse... to select a different location. You can change this later in Settings → Preferences.

Click Finish Setup to complete the wizard and enter the main application.

Setup complete! You're now ready to anonymize documents. The main interface will load with the file dropzone ready for your first document.

Main Interface Overview

After setup, the main interface is organized into several key areas:

Main interface showing header bar, mode toggle, preset selector, and file dropzone
Main interface in Anonymize mode — File Drop, Text Input, Batch Mode, and Image tabs

Header Bar

  • Mode Toggle — switch between Anonymize and Deanonymize modes
  • Preset Selector — quick-switch between detection presets
  • History — open the processing history panel
  • Settings — access app settings (Ctrl + ,)
  • Help — open the in-app help panel (F1)
  • Bug Report — submit feedback with diagnostic info

Processing Area

  • File Dropzone — drag and drop files or click to browse. Supports single files and batch uploads.
  • Document / Image Tab — toggle between document text anonymization and image redaction modes
  • Results Panel — shows detected entities grouped by type with accept/reject controls
  • Output Options — choose output format and save location

Status Bar

The bottom of the window shows engine status (running/stopped) and the currently active encryption key.

Document Anonymization

The core feature — detect and anonymize personal information in documents.

Text input mode with sample text containing PII, detection preset selector, and Analyze button
Text Input mode — paste text with PII, select a preset, and click Analyze

Workflow

1
Drop Files
Drag and drop files onto the dropzone or click to browse
2
Select Preset
Choose a detection preset that matches your use case (GDPR, HIPAA, Financial, etc.)
3
Start Analysis
Click 'Start Analysis' to extract text and detect entities
4
Review Entities
Review detected entities grouped by type (names, emails, phones, etc.)
5
Choose Output
Select output format (same, PDF, DOCX, TXT) and save option
6
Save
Click 'Save as New File' or 'Replace Original' to complete

Step-by-Step: Text Anonymization with Replace

Anonymize text by replacing personal data with type labels like <PERSON> and <EMAIL_ADDRESS>. The original values are permanently removed.

1
Paste Text with Personal Data

Enter or paste a document containing personal information — names, email addresses, phone numbers, physical addresses, Social Security Numbers, credit card numbers, IBANs, and organization names.

Pasting a business letter with names, emails, phone numbers, SSN, credit card, IBAN, and address into the anonym.plus text input area
2
Select Detection Preset

Choose “General PII Detection” from the preset dropdown. This preset detects Person, Email Address, Phone Number, Location, Date Time, and 7 additional entity types using the English NER model.

General PII Detection preset selected — detects persons, emails, phones, locations, credit cards, IBANs, SSNs, organizations, and more
3
Analyze Text

Click “Analyze Only” to run the Named Entity Recognition pipeline. A loading spinner shows while the text is scanned for PII.

Loading spinner while the NER pipeline detects personal data entities in the text
4
Review Detected Entities

All 10 detected entities appear as color-coded badges: Person (2), Organization (2), US SSN (1), Credit Card (1), Email Address (1), Phone Number (1), Location (1), IBAN Code (1). Toggle individual entities on or off with checkboxes, or use Select All / Deselect All.

10 detected entities displayed as color-coded badges — Person, Organization, US SSN, Credit Card, Email, Phone, Location, IBAN — with checkboxes to include or exclude each
5
Configure Replace Operators

The Configure Operators panel shows “Replace” selected for each entity type. Each PII value will be substituted with its type label in angle brackets — e.g., <PERSON>, <EMAIL_ADDRESS>. Quick-action buttons (All Replace, All Redact, All Mask, All Hash, All Encrypt) allow switching all operators at once.

Replace operator configured for all 8 entity types — each PII value will be substituted with a type label like PERSON, EMAIL_ADDRESS, PHONE_NUMBER
6
Anonymize

Click “Anonymize with Selected Operators” to process. A brief loading state appears while each entity is replaced.

Processing state while each entity is replaced according to the configured operators
7
View Anonymized Result

The anonymized text appears with all PII replaced: <PERSON> for names, <ORGANIZATION> for company names, <US_SSN>, <CREDIT_CARD>, <EMAIL_ADDRESS>, <PHONE_NUMBER>, <LOCATION>, <IBAN_CODE>. Use Copy to Clipboard or Clear to reset.

Anonymized text output with all PII replaced by type labels — PERSON, EMAIL_ADDRESS, PHONE_NUMBER, LOCATION, CREDIT_CARD, IBAN_CODE, US_SSN, ORGANIZATION

Step-by-Step: Text Anonymization with Encrypt

Anonymize text using reversible encryption — each PII value is encrypted with your key and can be decrypted later via the Deanonymize feature.

1
Paste Text with Personal Data

Enter or paste a document containing personal information — same as the replace workflow.

Pasting a business letter containing PII into the text input area for encryption-based anonymization
2
Select Detection Preset

Choose “General PII Detection” to detect a broad range of entity types.

General PII Detection preset selected for encrypted anonymization
3
Analyze Text

Run the NER pipeline to detect all personal data entities.

Analyzing text to detect personal data entities before encryption
4
Review Detected Entities

Review 10 detected entities with color-coded badges. Same entity types as replace.

Reviewing 10 detected PII entities with color-coded badges before choosing the encrypt operator
5
Select All Encrypt with Encryption Key

Click “All Encrypt” to set every entity type to the encrypt operator. Select “Production Key (256-bit)” from the key dropdown. Unlike Replace, the encrypt operator produces reversible tokens that can be decrypted later.

All Encrypt button clicked — every entity type set to encrypt operator with Production Key 256-bit selected for reversible anonymization
6
Encrypt

Click “Anonymize with Selected Operators” to encrypt all PII with the selected key.

Processing state while each entity is encrypted with the selected encryption key
7
View Encrypted Result

The output contains reversible encrypted tokens: <PERSON_ENC:a1b2c3...>, <EMAIL_ADDRESS_ENC:...>, etc. These tokens can be decrypted back to the original PII using the Deanonymize feature with the same encryption key.

Anonymized output with reversible encrypted tokens like PERSON_ENC and EMAIL_ADDRESS_ENC — decryptable via the Deanonymize feature
Reversible: Encrypted tokens can be decrypted back to original values using the Deanonymize feature. Replace tokens are permanent and cannot be reversed.

Step-by-Step: File Anonymization with Replace

Drop a document file to anonymize — text is extracted, PII detected, and a new anonymized file is saved to your output folder.

1
Open File Drop Zone

Navigate to the File Drop tab. The dropzone accepts PDF, DOCX, TXT, CSV, JSON, XML, XLSX, and XLS files up to 50MB.

File Drop tab with empty dropzone showing supported formats — PDF, DOCX, TXT, CSV, JSON, XML, XLSX, XLS — maximum 50MB
2
Drop File for Analysis

Drop a text file (e.g., business-letter.txt). It appears in a “Ready to Analyze” card with the filename, size, and the “General PII Detection” preset pre-selected. Click “Start Analysis (1 file)”.

Text file business-letter.txt queued and ready for analysis with General PII Detection preset and Start Analysis button
3
Analysis in Progress

The file card shows “Analyzing...” with a progress bar at 45%. Text is extracted and processed through the NER pipeline.

File analysis in progress at 45 percent — extracting text and detecting PII entities with progress bar
4
Review Detected Entities

The entity review panel lists all detected PII with color-coded badges and checkboxes. Select All / Deselect All controls are available. The output format selector and operator configuration are visible below.

Review panel showing all detected entities from the file with color-coded badges and checkboxes for each entity type
5
Configure Replace Operators

The Replace operator is configured for all entity types. The output format is set to “Same as original (TXT)”. Other format options include PDF and DOCX. Click “Anonymize & Save as New File” to process.

Replace operator configured for all entity types with output format selector — Save as original TXT, PDF, or DOCX
6
Saving Anonymized File

The file card shows “Anonymizing...” with a progress bar while the output file is reconstructed and saved.

Saving anonymized file to output folder with progress indicator
7
File Processing Complete

Green “Complete” status with entity count displayed. The anonymized file is saved to the output folder. A green toast notification confirms the output path.

File processing complete — 10 entities found, anonymized file saved to output folder with green success indicator

Step-by-Step: File Anonymization with Encrypt

Encrypt PII in document files for reversible anonymization — output files contain encrypted tokens that can be decrypted later.

1
Open File Drop Zone

Same dropzone as Replace — supports all document formats up to 50MB.

File Drop tab with empty dropzone for encryption-based file anonymization
2
Drop File for Analysis

Drop a text file. It appears in “Ready to Analyze” with preset selected.

Text file queued for analysis with General PII Detection preset selected
3
Analysis in Progress

Progress bar while text is extracted and PII detected.

File analysis in progress — extracting text and running NER detection
4
Review Detected Entities

Same entity review panel with color-coded badges.

Reviewing detected PII entities before applying the encrypt operator
5
Select All Encrypt with Key

Click “All Encrypt” to switch all operators to encrypt mode. Select “Production Key (256-bit)” for reversible encryption.

All Encrypt clicked — encrypt operator with Production Key 256-bit for reversible file anonymization
6
Saving Encrypted File

The file is processed with encrypt operators and saved to the output folder.

Encrypting and saving file with reversible tokens to output folder
7
File Processing Complete

Output file contains encrypted tokens like <PERSON_ENC:...> that can be decrypted later using the Deanonymize feature.

File processing complete — output contains encrypted tokens like PERSON_ENC that can be decrypted later

Supported Formats

Input

PDFDOCXXLSXTXTCSVJSONXML

Output

PDFDOCXTXTSame as input

File Size Limits

FormatMax Size
PDF50 MB
TXT50 MB
DOCX30 MB
CSV30 MB
JSON30 MB
XML30 MB
XLSX20 MB or 100,000 rows

Image Anonymization

Detect and redact personal information directly in images. Uses Tesseract OCR to extract text from images, then applies the same PII detection engine to find and visually redact sensitive data.

Image anonymization panel with preset selector, fill color options, and image dropzone
Image mode — select a preset, choose a redaction fill color, and drop an image

Workflow

1
Switch to Image Mode
Click the Image tab in the anonymization panel
2
Upload Image
Drag and drop an image file (PNG, JPG, BMP, or TIFF) or click to browse. Max: 10 MB, 25 megapixels.
3
Select Preset & Language
Choose a detection preset and the OCR language matching the text in your image
4
Analyze
Click 'Analyze' to extract text via OCR and detect PII entities with bounding boxes
5
Redact
Click 'Redact' to generate a new image with PII covered by colored redaction boxes
6
Download
Download the redacted image as PNG

Step-by-Step: Image Anonymization

Detect and redact PII in images using OCR text extraction and NER-based entity detection.

1
Open Image Drop Zone

Navigate to the Image tab. The dropzone accepts PNG, JPG, BMP, and TIFF images up to 10MB.

Image tab with empty dropzone for PNG, JPG, BMP, TIFF files — maximum 10MB
2
Load Image and Configure

Drop a business card image. The preview shows the card with visible PII. Below: fill color selector (black, red, green, blue, gray), detection preset “General PII Detection”, and transform tools (rotate, flip). Click “Analyze”.

Business card image loaded with fill color selector, detection preset, and transform tools — ready to analyze
3
OCR and NER Analysis

The app runs Tesseract OCR to extract text, then Presidio NER to detect PII entities and their bounding box positions within the image.

Analyzing image via OCR text extraction and NER-based PII detection
4
Review Detected Entities with Bounding Boxes

The image shows colored bounding boxes overlaid on each detected PII area. Entity type filter badges (Person, Email Address, Phone Number, Location, Organization) with checkboxes allow selecting which to redact. Click “Redact Selected (5 entities)”.

Detected PII shown with colored bounding boxes on the image — Person, Email, Phone, Location, Organization — with checkboxes to select which to redact
5
Redacting PII Areas

A loading indicator appears while selected PII regions are covered with black fill rectangles.

Redacting selected PII areas with black fill rectangles over detected text regions
6
Before and After Comparison

Side-by-side view: the Original image (left) with visible PII, and the Redacted image (right) with black bars covering all detected areas. Stats show entity count. Use the Save button to download the redacted image.

Before and after comparison — original business card alongside redacted version with black bars covering all detected PII

Supported Formats

PNGJPG/JPEGBMPTIFF

OCR Languages

38 languages supported including English, German, French, Spanish, Italian, Portuguese, Dutch, Arabic, Chinese, Japanese, Korean, Hindi, Russian, and more. Select the correct language for best OCR accuracy.

How It Works

1
Image uploaded and EXIF orientation auto-corrected
2
Tesseract OCR extracts text with character-level bounding boxes
3
PII detection engine analyzes extracted text
4
Bounding boxes padded (4px) and adjacent boxes for multi-word entities merged
5
Redaction boxes drawn over detected PII regions

Known Limitations

IssueDetail
Photos of screensMoiré patterns, glare, and reflections degrade OCR. Use screenshots instead.
Handwritten textTesseract is optimized for printed/typed text only.
Low resolutionBelow 150 DPI may have poor accuracy. Use 300+ DPI for scans.
Rotated/skewed textText at angles >15° may not extract correctly.
Complex backgroundsWatermarks and colored backgrounds can interfere.
Very small textBelow ~8pt at the image's effective resolution may not be detected.
Multi-column layoutsOCR may mix columns in complex layouts.
NER languageNamed entity recognition uses the English model. Pattern-based entities (phones, IBANs, emails) work in all languages.

Tips

  • Use screenshots instead of camera photos of screens for much better results
  • Select the correct OCR language matching the text in your image
  • Ensure images are well-lit with good contrast between text and background
  • For scanned documents, use 300 DPI or higher resolution
  • Crop images to focus on the text area for faster processing
  • EXIF orientation is applied automatically — no need to manually rotate photos

Batch Processing

Process multiple documents at once with parallel file handling. Batch mode is available for document anonymization.

Batch mode panel with multi-file dropzone showing supported formats
Batch Mode — drop multiple files for parallel processing

Workflow

1
Drop Multiple Files
Drag and drop up to 20 files at once onto the dropzone, or click to browse and select multiple files
2
Select Preset
Choose a detection preset — the same preset applies to all files in the batch
3
Start Batch Analysis
All files are extracted and analyzed in parallel for faster processing
4
Review Per File
Review detected entities for each file individually — accept, reject, or modify detections
5
Save All
Save all processed files to your output folder

Step-by-Step: Batch Processing with Replace

Process multiple files at once with the Replace operator — all PII is substituted with type labels and saved as a ZIP archive.

1
Open Batch Dropzone

Navigate to the Batch Mode tab. The dropzone accepts multiple files (PDF, DOCX, TXT, CSV, JSON, XML, XLSX) up to 50MB per file.

Batch Mode tab with multi-file dropzone — supports PDF, DOCX, TXT, CSV, JSON, XML, XLSX up to 50MB
2
Add Files and Configure

Three files added: business-letter.txt (2 KB), invoice.pdf (44 KB), contacts.csv (8 KB). Each shows in a card with pending status. The Batch Configuration panel shows preset selector, Replace operator mode, concurrency, auto-approve toggle, and export settings.

Three files added — business-letter.txt, invoice.pdf, contacts.csv — with batch configuration panel showing Replace operator, preset, concurrency, and export settings
3
Review Full Configuration

General PII Detection preset, Replace operator, 2 parallel files, Auto-Approve Entities ON (skips manual review for faster processing), Continue on error, output format “Same as original”, export as ZIP Archive, filename pattern {name}_anonymized.{ext}. Click “Start Batch (3 files)”.

Full batch config — General PII Detection preset, Replace operator, 2 parallel files, auto-approve ON, Continue on error, ZIP archive export
4
Monitor Processing Progress

Progress bar at 33% — 1/3 completed. Live stats show elapsed time, estimated remaining time, and 10 entities found so far. File statuses: business-letter.txt Done (10 entities), invoice.pdf Analyzing (45%), contacts.csv Waiting. Pause and Cancel buttons available.

Batch processing at 33 percent — 1 file complete with 10 entities, 1 analyzing at 45 percent, 1 waiting — with Pause and Cancel buttons
5
All Files Complete

All 3 files show green checkmarks with individual entity counts (10, 7, 5). Total: 22 entities found, 0 errors. Export Results and New Batch buttons ready.

All 3 files processed — green checkmarks with entity counts of 10, 7, and 5 — Export Results and New Batch buttons
6
View Results Summary

Modal showing 100% success rate, stats grid (3 completed, 0 failed, 22 entities, 0 tokens), preset “default”, output format “Original”. ZIP archive exported with “Open Location” button.

Batch complete modal — 100 percent success rate, 3 completed, 22 entities found, ZIP archive exported to output folder

Step-by-Step: Batch Processing with Encrypt

Process multiple files with reversible encryption — output files contain encrypted tokens that can be decrypted later.

1
Open Batch Dropzone

Same multi-file dropzone as Replace mode.

Batch Mode tab with multi-file dropzone for encryption-based batch processing
2
Add Files with Encrypt Mode

Three files added. The operator mode shows Encrypt with encryption key dropdown visible.

Three files added with Encrypt operator selected and encryption key dropdown visible
3
Configure Encrypt Settings

Full config: Encrypt operator highlighted, “Encryption Key: Select a key” dropdown, “Reversible encryption with key” hint. Other settings: 2 parallel files, auto-approve ON, ZIP archive export. Click “Start Batch (3 files)”.

Full batch config with Encrypt operator highlighted, Production Key 256-bit, 2 parallel files, auto-approve ON, ZIP archive export
4
Monitor Encryption Progress

Progress bar with mixed file statuses — same layout as Replace but processing with encrypt operators.

Batch encryption processing — mixed file statuses with progress bar and live stats
5
All Files Encrypted

All 3 files complete with green checkmarks and entity counts. Output files contain reversible encrypted tokens.

All 3 files encrypted — green checkmarks with entity counts, Export Results button
6
View Results Summary

100% success modal with encrypted output in ZIP archive.

Batch complete modal — 100 percent success with encrypted output in ZIP archive

Limits

ParameterLimit
Files per batch20
Total batch sizeCombined file size limits apply per format (see Document Anonymization)
Parallel processingFiles analyzed concurrently for speed

Progress Tracking

During batch processing, each file shows its own progress indicator with status (queued, extracting, analyzing, complete). Files that fail are flagged individually without stopping the rest of the batch.

Tip: For large batches, ensure you have sufficient disk space before starting.

Deanonymization (Decrypt)

Restore original PII values from anonymized documents using your encryption keys. Works with any document that was anonymized using the 'encrypt' operator.

Deanonymize panel with file drop, text input, and from history tabs
Deanonymize mode — File Drop, Text Input, and From History tabs

Input Modes

A
File Drop
Drop an anonymized document (PDF, DOCX, TXT, CSV, JSON, XML, XLSX). Text is extracted and automatically matched against your history to load the correct encryption keys.
B
Text Input
Paste anonymized text directly. The app automatically searches your history for matching encrypted chunks and loads the correct keys — even if the surrounding text was edited.
C
From History
Select a previous anonymization entry. All entity positions and key mappings are loaded instantly.

Step-by-Step: Deanonymize from History

Restore original PII from a previously encrypted anonymization by selecting it from your processing history.

1
Open Deanonymize Panel

Click “Deanonymize” in the header bar. The panel shows three tabs: File Drop, Text Input, and From History. The File Drop tab is active by default with a dropzone for anonymized files. “How Deanonymization Works” info box explains the process.

Deanonymize panel with three input modes — File Drop, Text Input, and From History tabs — and dropzone for anonymized files
2
Select from Processing History

Switch to the “From History” tab. Previously anonymized files are listed with metadata: filename (business-letter.txt), format (TEXT), entity count (10), preset (General PII Detection), and a key icon indicating encryption was used. Click to select.

From History tab showing a previously anonymized business-letter.txt entry with 10 entities, TEXT format, and General PII Detection preset
3
Review Encrypted Text and Select Key

The encrypted text is pre-loaded in the Text Input tab with tokens like <PERSON_ENC:a1b2c3d4e5f6> and <ORGANIZATION_ENC:f7g8h9i0j1k2>. The encryption key selector shows 2 keys available. A green “History entry matched” banner confirms 10 encrypted entities loaded.

Encrypted text pre-loaded with tokens like PERSON_ENC — encryption key selector showing 2 available keys for decryption
4
Decrypt

Click “Deanonymize” to process each encrypted token. A loading state appears during decryption.

Loading state while encrypted tokens are decrypted using the encryption key
5
View Restored Original Text

“Deanonymization Complete” card shows “10 items restored, 0 tokens used”. The fully decrypted text displays all original PII: John Smith, Acme Corporation, 123-45-6789, 4111-1111-1111-1111, john.smith@acme.com, +1 (555) 123-4567, 742 Evergreen Terrace Springfield IL 62704, and IBAN DE89 3704 0044 0532 0130 00. Copy and Download buttons available.

Deanonymization complete — 10 items restored with full original text including John Smith, Acme Corporation, SSN, credit card, email, phone, address, and IBAN

Step-by-Step: Deanonymize via File Drop

Drop an encrypted file to automatically extract text, match against your history, and decrypt all PII.

1
Open File Drop Tab

The Deanonymize panel shows the File Drop tab with a dropzone accepting anonymized documents (PDF, DOCX, TXT, CSV, JSON, XML, XLSX, XLS up to 50MB). “How Deanonymization Works” info box visible below.

Deanonymize panel with File Drop tab active — drop an anonymized document to automatically extract and decrypt
2
Drop Encrypted File

Drop business-letter_anonymized.txt. The encrypted text is extracted and displayed in the text area with tokens like <PERSON_ENC:a1b2c3d4e5f6> visible. The encryption key selector shows 2 keys available.

Encrypted text file business-letter_anonymized.txt dropped — encrypted text extracted and displayed with tokens visible
3
Auto-Match History Entry

The app automatically searches your processing history and finds a matching entry. A green “History entry matched” banner appears: “10 encrypted entities loaded from history. Ready to decrypt.” The correct encryption key metadata is loaded.

History entry auto-matched — 10 encrypted entities loaded from history, encryption key auto-selected, ready to decrypt
4
Confirm Key Selection

The encryption key is confirmed. The matched history indicator is visible. The “Deanonymize” button is ready.

Encryption key confirmed with matched history indicator — Deanonymize button ready
5
Decrypt File

Click “Deanonymize” to decrypt all encrypted tokens using the matched encryption key.

Decrypting encrypted tokens from the file using the matched encryption key
6
View Restored Original Text

File deanonymization complete — all original PII values restored including names, SSN, credit card, email, phone, address, and IBAN. Copy and Download buttons available.

File deanonymization complete — all original PII values restored including names, SSN, credit card, email, phone, address, and IBAN

How to Deanonymize

  1. Switch to 'Deanonymize' mode using the toggle in the header
  2. Drop a file, paste text, or select from history — keys load automatically
  3. If auto-match fails, manually select the encryption key
  4. Click 'Deanonymize' to restore original values
  5. Copy or download the restored text

Encrypt → Share → Edit → Decrypt

You can encrypt a document, share it with collaborators, receive it back with edits, and still decrypt the PII:

1
Anonymize a document using the 'encrypt' operator with your encryption key
2
Share the anonymized document (email, cloud storage, etc.)
3
Collaborators edit the document — adding text, rewriting around encrypted chunks
4
You receive the modified document back
5
Drop it in Deanonymize → File Drop — the app auto-detects encrypted chunks
6
Click Deanonymize — all intact encrypted chunks are decrypted
Note: Encrypted chunks must remain intact — if someone partially edits a ciphertext block, that block cannot be decrypted. Surrounding text can be freely added, removed, or rearranged. Missing chunks are skipped; the rest are still decrypted (partial recovery).

Detection Presets

Pre-configured entity detection profiles for different use cases. 121 built-in presets across 7 categories.

Detection presets panel showing 121 presets across categories like Country, Regional, Technical, Industry
121 built-in presets organized by category — Country, Regional, Technical, Industry, Healthcare, Financial
PresetDescriptionThresholdEntity Types
General PII DetectionComprehensive detection for common PII types0.8510
GDPR ComplianceEuropean data protection requirements0.9010
HIPAA MedicalUS healthcare PHI protection0.909
Financial ServicesBanking and financial data0.9510
Development & TestingLightweight preset for dev environments0.705
Multi-Language EuropeanMulti-language support for EU markets0.859

Custom Presets

Create your own presets in Settings → Presets. Select entity types, set operators, and configure confidence thresholds. Custom presets are stored in your vault.

Custom Entities

Define your own PII entity types using regular expression patterns. Custom entities are detected alongside built-in types during anonymization.

Custom entities panel with search, import/export buttons, and new entity button
Custom Entities — define your own PII types with regex patterns, import/export definitions

Creating a Custom Entity

1
Open Settings → Custom Entities
Navigate to the Custom Entities tab in Settings
2
Add New Entity
Click "Add Custom Entity" and provide a name and regex pattern
3
Test Your Pattern
Use the inline pattern tester to verify matches with real-time highlighting
4
Save
Save the entity — it's now available in all presets and analyses

Pattern Guidelines

  • Use standard JavaScript regex syntax (no delimiters needed)
  • Patterns are validated for ReDoS safety — catastrophic backtracking patterns are rejected
  • Test with real sample data using the inline tester before saving
  • Use named groups (?<value>...) to capture only the relevant part of a match

Import & Export

Custom entity definitions can be exported as JSON and imported on another machine or shared with team members. This makes it easy to standardize detection rules across an organization.

Limits

ParameterLimit
Maximum custom entities50
Pattern length500 characters
ReDoS protectionEnabled — unsafe patterns are rejected

Encryption Keys

Manage encryption keys for reversible anonymization.

Encryption keys panel showing 3 keys with search, sort, and new key button
Encryption Keys — create, manage, and set default keys for reversible anonymization
  • Create and store encryption keys securely in your vault
  • Apply encryption to specific entity types
  • Keys are stored locally — only you can decrypt
  • Sync keys across devices via your account

How to Use

1
Go to Settings → Encryption Keys to manage encryption keys
2
Create a new key or sync from your account
3
When processing, select an encryption key in the review panel
4
Anonymized data can be decrypted later using the same key

Processing History

View and manage your anonymization history.

History panel showing list of processed files with dates and entity counts
Processing History — view past anonymizations, expand entries for details
  • View all processed files with timestamps
  • See entity counts and tokens used
  • Copy original or anonymized text
  • Use history entries for deanonymization
  • History stored locally in encrypted vault
Note: History deletion is permanent for privacy reasons. History is auto-cleaned after 90 days or when the entry limit (1,000) is reached.

Settings

Settings window showing Preferences tab with language, theme, and output folder options
Settings — Preferences tab with language, theme, and output folder configuration

Account

  • Sign in with browser or ZK authentication
  • View license plan and activation status
  • Sync presets and encryption keys
  • Sign out

Preferences

  • Language selection (48 languages)
  • Theme (Light / Dark / System)
  • Output folder configuration
  • Auto-update settings

Security

  • Change or set PIN (4–8 digits)
  • View recovery phrase
  • Vault lock settings
  • Reset vault

Encryption Keys

  • Create and manage encryption keys
  • Set default key and entity type binding
  • Rotate key values (one-time display)
  • Keys stored locally in encrypted vault — values never leave your machine

Presets

  • 121 built-in presets across 7 categories
  • Create custom presets with entity selection
  • Configure per-entity-type operators
  • Set default preset for auto-selection
  • Duplicate built-in presets as custom

Entities

  • Enable/disable 200+ PII entity types globally
  • Search and filter by entity group
  • Per-group and global Enable All / Disable All

Custom Entities

  • Define custom PII types with regex patterns
  • Inline pattern tester with real-time highlighting
  • Import/export custom entity definitions
  • Max 50 custom entities, ReDoS-safe validation

Models

  • Download additional language models for PII detection
  • 23 spaCy-based languages available
  • Check for model updates
  • Delete unused models to save disk space

Advanced

  • Embedded debug log viewer with cross-window log broadcasting
  • Log level configuration
  • Data management: export, import, delete, move vault data

About

  • App version and build info
  • Engine status (PII detection engine)
  • Download and install updates
  • Links to documentation and support

Keyboard Shortcuts

ShortcutAction
F1Open help panel
Ctrl + ,Open settings
Ctrl + OOpen file
Ctrl + HToggle history panel
Ctrl + Shift + DToggle debug log window
EscapeClose panels

Security

Vault Encryption

Your sensitive data is protected with military-grade encryption.

  • AES-256-GCM encryption for all stored data
  • Argon2id key derivation (64 MB memory, 3 iterations)
  • BIP39 24-word recovery phrase
  • PIN-based quick unlock for daily use
  • Sensitive data zeroized from memory when locked

How Your Data is Processed

1
Files are read locally on your computer
2
Text is extracted locally — documents never leave your machine
3
PII detection runs on the local Presidio engine (bundled with the app)
4
Detected entities are anonymized locally via the Rust backend
5
Encryption keys never leave the local vault (zero-knowledge boundary)
6
Document reconstructed in original format (PDF, DOCX, XLSX, etc.)
7
Output saved to your chosen folder
8
Results stored in encrypted vault history for deanonymization

What We Never Store

Zero-knowledge design: We never store your original documents, recovery phrase, encryption keys (stored only in your vault), or document contents (only metadata for history).

Troubleshooting

IssueSolution
App shows white screenTry restarting the app. If persists, reset vault in Settings > Security.
Forgot PINUse your 24-word recovery phrase to reset the vault.
Lost recovery phraseIf vault is unlocked, view it in Settings > Security. Otherwise, data cannot be recovered.
Files not processingCheck file size limits. Ensure the correct file format is used.
Sign in with Browser not workingEnsure your default browser allows the anonym-plus:// protocol.
Presets not loadingCheck internet connection. App will use offline fallback presets.
Image analysis returns no entitiesVerify the correct OCR language is selected. Ensure clear, readable text at 300+ DPI. Use screenshots instead of photos of screens.
Image redaction misses some textOCR may struggle with handwritten text, very small fonts, skewed text, or complex backgrounds. Straighten the image and increase contrast.
Image upload failsCheck: supported format (PNG, JPG, BMP, TIFF), under 10 MB, under 25 megapixels.
'No anonymized entities found'The text doesn't contain entity markers. Auto-match against history or select from the 'From History' tab.
'Decryption failed'Ensure you're using the same encryption key from anonymization. Verify in Settings → Encryption Keys.
PII detection engine not runningCheck engine status in Settings → About. Click restart. Check debug log (Ctrl+Shift+D).
Custom entities not detectedEnsure the entity is enabled in Settings → Custom Entities and the regex pattern matches.

Error Messages

MessageMeaning
No text content foundThe file appears to be empty or contains only images.
Analysis failedEnsure the PII detection engine is running. Check Settings → About.
Extraction data not foundThe file needs to be re-analyzed.
Image too largeExceeds 10 MB size or 25 megapixel limit. Resize before uploading.
No text detected in imageOCR could not extract text. Ensure readable printed text with sufficient contrast.
No anonymized entities foundText doesn't contain entity placeholders or encrypted chunks. Select from History tab.
Decryption failedEncryption key mismatch. Verify the correct key in the dropdown.
Encryption keys not foundKeys need re-importing. Go to Settings → Encryption Keys.

Frequently Asked Questions

Jump to: Security · Anonymization · Deanonymization · Encryption Keys · Batch · Presets · Custom Entities · Images · Models · History · Licensing · Updates · Troubleshooting

Support

Need help? Reach out through any of these channels:

  • Documentation — this page
  • Contact Support — submit a support request
  • In-app bug reporting — use the bug icon in the app header to report issues with diagnostic information