Privatiser redacts IPs, API keys, passwords, PII, and cloud identifiers from your text. Paste the anonymized version into ChatGPT, Claude, or Gemini — then restore the real data in the AI's response.
Everything runs locally. Nothing leaves your machine.
API keys (AWS, OpenAI, GitHub, Slack), JWTs, bearer tokens, PEM keys, connection strings, hex secrets, SSH keys
IPv4 addresses (with CIDR), domain names, email addresses, MAC addresses, internal URLs with ports
US/UK phone numbers, credit cards (Luhn-validated), Social Security numbers, passport numbers, IBANs
AWS account IDs, ARNs (structure preserved), S3 buckets, Azure subscription IDs, GCP project IDs
Every redaction has a mapping. Paste the AI response back and restore all original values with one click.
No servers, no telemetry, no data collection. The anonymization engine runs entirely in your browser or terminal.
| Pseudonym | Original |
|---|
Paste a config file, log output, code snippet, or .env file into the input box.
Privatiser detects and replaces sensitive values with consistent pseudonyms. A mapping is saved so you can reverse it.
Copy the anonymized text and paste it into ChatGPT, Claude, Gemini, or any AI tool. The structure is preserved so the AI can still help.
Paste the AI's response into the Deanonymize tab with the mapping to get back the real values.
Auto-anonymizes when you paste into AI chat sites. Auto-restores when you copy the response.
Pipe files through the CLI, use as a Python library, or run the local web UI.
pip install privatiser
cat config.tf | privatiser anonymize -m mapping.json
privatiser anonymize .env --env -m mapping.json
privatiser deanonymize response.txt -m mapping.json
privatiser ui