How It Works
Decoy splits the work between your browser and the cloud LLM. This page walks through what each side does, what it sees, and what it doesn't. If something doesn't add up, write to us. We'd rather have the conversation than have you wonder.
The Flow
What The Cloud Sees
Below is the exact text Decoy sent to the cloud during the demo on the home page, alongside what you originally pasted. The cloud has no way to recover the left side from the right side.
Acme Corp bought 4,200 units in Q3 at $89 per unit. Their account manager Sarah Chen reports they're considering doubling their order in Q4.
[C_8847] bought [N_2201] units in [P_03] at [N_2202] per unit. Their account manager [P_4419] reports they're considering doubling their order in [P_04].
The right column is a complete record of what crossed your network. There is nothing else.
What We Don't Do
We don't run a server in the data path. Decoy is a static web app. There is no Decoy backend that sees your prompts, your API key, or your data. We literally couldn't read your data if we wanted to, there's no place we'd read it from.
We don't store anything between sessions by default. The token-to-value mapping is held in your browser's memory and destroyed when you close the tab or end the session. Optional opt-in session resume uses your browser's IndexedDB only, never our servers, because we don't have any.
We don't intermediate your LLM provider. You bring your own API key. Your prompts go directly to Anthropic, OpenAI, or Google. Their privacy policy applies, not ours.
We don't see your usage. No analytics, no telemetry, no tracking pixels. We don't know what tasks you reach for Decoy on, who you are, or how often you use it. If you tell us, we'll know. If you don't, we won't.
We don't claim to solve every privacy problem. If your industry requires data residency, formal certification, audit logging, or specific frameworks like IRAP, the v1 web app is not the right shape for that yet. Talk to us. We're building toward it, and you might be the first one we build it with.
Open Questions
Magnitude leakage. A very large number can be identifying even when tokenised. "$400M revenue from a Sydney audio company" maps to one company. We have an opt-in bucketing mode in development for high-sensitivity tasks. Right now you should know it exists as a consideration.
Free-text generation. The planning + execution split fits analytical tasks. It doesn't fit "write me an email about [C_8847]." We're not solving that with Decoy in v1. There may be a different shape of product for it later.
Schema robustness. The cloud model occasionally returns a malformed JSON plan. Decoy retries with a tighter prompt and falls back to a human-readable plan if that fails. This is rare but it happens. We log it locally and we're improving it.
Operation coverage. The closed set (multiply, add, max, percentile, filter, etc.) covers most spreadsheet-like work. It doesn't cover advanced statistics, ML-style operations, or anything requiring custom code. We add primitives as new patterns emerge from real use.
Regulated Industries
Decoy v1 is a single-user web app. It is not currently SOC 2, ISO 27001, IRAP, or HIPAA assessed. It does not yet offer the audit logging, admin controls, or data residency guarantees that procurement teams in finance, healthcare, defence, and government need.
We're building toward all of that. The architecture supports it; the certifications take time and money. If you work somewhere where those things are required and you'd like to be a design partner for that version, we'd genuinely like to hear from you.
If Something's Off
If you've read this page and you've spotted a hole in our reasoning, an architecture concern, a privacy claim that doesn't quite hold, or just a question we should be answering and aren't, tell us. We'd rather have the conversation than have you wonder.
hello@decoy.tools