Privacy & Security
Configure air-gapped mode, encryption at rest, secure workspace setup, and no-telemetry architecture for maximum case data protection.
Privacy & Security#
FrameCounsel is architected from the ground up with a zero-trust approach to case data. Every feature operates locally on your Mac, no data is transmitted to external servers, and the application includes no telemetry, analytics, or phone-home capabilities of any kind.
This is not a marketing bullet point. It is the foundational engineering decision that every other feature is built on top of. Only physical control of your data guarantees attorney-client privilege.
The Cloud AI Threat#
Critical: Why Defense Attorneys Must Never Use Cloud AI
Every time you paste case text into ChatGPT, Claude, Google Gemini, or any cloud-based AI tool, you are transmitting privileged client data to a third-party server. That data may be logged, stored, used for model training, or made accessible to the provider's employees. Attorney-client privilege is destroyed the moment a third party gains access to privileged communications. There is no undo button.
The legal profession is experiencing a rush toward AI tools, but most attorneys do not understand the catastrophic risk that cloud-based AI poses to their clients and their own licenses.
How Cloud AI Services Handle Your Data#
When you use a cloud AI tool, here is what actually happens:
- Your input is transmitted over the internet to a remote data center owned by OpenAI, Anthropic, Google, or Microsoft
- Your data is processed on shared infrastructure alongside queries from millions of other users
- Your data may be logged in server logs, debugging systems, and monitoring pipelines
- Your data may be used for training unless you have negotiated a specific enterprise agreement (and even then, the data still sits on their servers)
- Your data is subject to that company's jurisdiction, their subpoena obligations, their security practices, and their employees' access policies
The Privilege Destruction Problem#
Attorney-client privilege requires that communications remain confidential between attorney and client. The moment you paste a police report, witness statement, case strategy memo, or any work product into a cloud AI service, you have voluntarily disclosed that information to a third party. Under most state bar ethics opinions:
- Voluntary disclosure to a third party waives privilege for that specific communication
- The waiver may extend beyond the specific text you entered, potentially opening the door to broader discovery
- Opposing counsel can argue that your use of cloud AI constitutes a waiver of work-product protection
- Malpractice liability arises if privileged information is exposed through negligent use of cloud tools
Specific Risks by Provider#
| Provider | Training on Data | Data Retention | Server Location | Subpoena Risk |
|---|---|---|---|---|
| OpenAI (ChatGPT) | Yes, by default (opt-out available on paid plans) | 30 days minimum | US data centers | Subject to US law enforcement requests |
| Anthropic (Claude) | Yes, on free tier; enterprise terms vary | Retained for safety monitoring | US data centers | Subject to US law enforcement requests |
| Google (Gemini) | Yes, by default | Up to 18 months | Global data centers | Subject to requests in multiple jurisdictions |
| Microsoft (Copilot) | Varies by plan | Varies by plan | Global data centers | Subject to requests in multiple jurisdictions |
No Cloud AI Provider Can Guarantee Privilege
Even enterprise AI agreements with "no training" clauses do not solve the fundamental problem: your data still resides on servers you do not control, administered by employees you have not vetted, subject to legal processes you cannot predict. The only way to guarantee that privileged data stays privileged is to never let it leave your physical possession.
Most "AI Legal Tools" Are Dangerous Cloud Wrappers#
Many products marketed as "AI for lawyers" are thin interfaces on top of cloud AI APIs. They send your data to OpenAI, Anthropic, or Google behind the scenes. Some warning signs:
- "Powered by GPT-4" or "Built on Claude" means your data goes to that provider's servers
- Requires an internet connection for AI features means processing happens remotely
- Browser-based interface often means server-side processing
- "Your data is encrypted in transit" is a deflection; the issue is not interception, it is that the data arrives at someone else's server at all
- "We don't train on your data" may be true for the wrapper company, but what about the underlying AI provider?
FrameCounsel is fundamentally different. Every AI model ships bundled with the application and runs on your Mac's Neural Engine. Your case data never leaves your machine. There is no API call, no cloud endpoint, no remote server. Period.
No-Telemetry Architecture#
Unlike many modern applications, FrameCounsel collects absolutely no usage data:
- No analytics - No tracking pixels, no usage metrics, no crash reports sent externally
- No network calls - The application makes zero outbound network connections during normal operation
- No cloud sync - Case data is never uploaded, backed up, or synchronized to any remote service
- No update checks - Software updates are downloaded manually from your license portal when you choose
Network Verification
You can verify FrameCounsel's network behavior using macOS Activity Monitor or any network monitoring tool. The application establishes zero network connections during normal operation. The only exception is the optional OSINT module, which makes clearly disclosed queries to public databases when you explicitly initiate a search.
Setting Up Your Evidence Vault#
The most secure way to run FrameCounsel is with a dedicated external evidence drive that serves as your "local cloud" -- a portable, encrypted, physically securable storage device that replaces cloud storage entirely.
Recommended Hardware: SanDisk Professional Pro-G40 SSD#
We recommend the SanDisk Professional Pro-G40 Thunderbolt SSD as the ideal evidence vault for FrameCounsel workspaces:
| Specification | Detail |
|---|---|
| Interface | Thunderbolt 3 / USB-C (up to 40Gbps Thunderbolt, 10Gbps USB) |
| Read Speed | Up to 3,000 MB/s (Thunderbolt) |
| Write Speed | Up to 2,500 MB/s (Thunderbolt) |
| Capacities | 1TB, 2TB, 4TB |
| Encryption | 256-bit AES hardware encryption |
| Durability | IP68 dust/water resistant, 3-meter drop protection, 4000 lb crush resistance |
| Rating | Designed for professional field use in harsh environments |
Why an External Evidence Drive?#
- Physical chain of custody: When you are done working, unplug the drive, lock it in a safe, and log the access. No cloud server can offer this level of physical control.
- Air-gap capability: The drive can be used on a machine with no network connection whatsoever.
- Portability: Bring the drive to court, to the jail for client meetings, or to an expert witness -- without ever transmitting data over a network.
- Disaster isolation: If your Mac is compromised, lost, or seized, the evidence drive can be secured independently.
- Multi-machine workflow: Use the same evidence vault across multiple Macs without ever syncing through a cloud service.
Setting Up Your Pro-G40 as an Evidence Vault#
- Connect the Pro-G40 to your Mac via the Thunderbolt cable (use the Thunderbolt port for maximum speed)
- Format the drive using Disk Utility with APFS (Encrypted). Choose a strong passphrase and store it securely.
- Open FrameCounsel and navigate to Settings > Workspace
- Set the workspace location to a folder on the Pro-G40 (e.g.,
/Volumes/EvidenceVault/FrameCounsel) - Enable workspace encryption in Settings > Security for an additional encryption layer on top of the drive's hardware encryption
- Create a drive access log -- maintain a physical log sheet that records who connected the drive, when, and for what purpose
Double Encryption
When you use FrameCounsel's workspace encryption on top of the Pro-G40's hardware AES-256 encryption, your evidence is protected by two independent encryption layers. Even if an attacker physically obtains the drive, they must defeat both the drive's hardware encryption and FrameCounsel's software encryption to access case data.
Drive Security Protocols#
- Always eject properly before disconnecting (use the eject button in Finder or FrameCounsel's "Safely Disconnect" option)
- Store in a locked location when not in use (a fireproof safe is recommended)
- Maintain a physical access log recording every connection and disconnection
- Label the drive with a case number or "PRIVILEGED -- ATTORNEY WORK PRODUCT" designation
- Never connect to an untrusted computer -- the drive should only be used with machines you control
- Create an encrypted backup to a second Pro-G40 for disaster recovery, stored in a separate physical location
Chain of Custody Deep Dive#
FrameCounsel's chain of custody system is built on cryptographic primitives that make tampering mathematically detectable.
SHA-256: The Foundation of Evidence Integrity#
SHA-256 (Secure Hash Algorithm, 256-bit) produces a unique 64-character hexadecimal fingerprint for any file. This hash has several critical properties:
- Deterministic: The same file always produces the same hash
- Avalanche effect: Changing even a single bit of the file produces a completely different hash
- Collision resistant: It is computationally infeasible to find two different files that produce the same hash
- One-way: You cannot reconstruct the original file from its hash
When you import evidence into FrameCounsel, the application immediately computes the SHA-256 hash and records it in the immutable audit trail. This hash becomes the file's permanent identity.
Tamper Detection in Practice#
FrameCounsel performs automatic integrity verification at multiple points:
- At import: Hash is computed and recorded
- Before any analysis: Hash is recomputed and compared to the import hash
- After any processing: New hash is computed for any derivative files, with the processing chain documented
- At export: Hash is recomputed and verified before generating any report or court document
- On-demand: Manual verification available at any time via Tools > Verify Integrity or
If any hash verification fails, FrameCounsel immediately alerts you with a tamper warning, locks the affected file from further processing, and logs the discrepancy in the audit trail.
The Immutable Audit Trail#
Every action in FrameCounsel is recorded in an append-only log that cannot be edited, overwritten, or deleted. Each log entry is itself hashed and chained to the previous entry, creating a structure similar to a blockchain. This means:
- No entry can be removed without breaking the chain
- No entry can be modified without invalidating all subsequent entries
- The entire history is cryptographically verifiable from first entry to last
- Any gap or inconsistency is immediately detectable
This audit trail is your courtroom proof that evidence was handled properly from the moment it entered your possession to the moment it was presented in court.
Court-Ready Documentation
FrameCounsel can export the complete audit trail as a Certificate of Authenticity, formatted for court filing, that includes every hash, every timestamp, and every action taken on the evidence. This document alone is often sufficient to satisfy chain-of-custody challenges.
Air-Gapped Mode Configuration#
For the highest level of security, FrameCounsel supports full air-gapped operation on machines with no network connectivity. This is the gold standard for handling sensitive evidence.
When to Use Air-Gapped Mode#
- Cases involving classified or highly sensitive material
- High-profile defendants where media or public interest creates leak risk
- Any situation where court order or firm policy requires network isolation
- Cases where opposing counsel or government agencies may be monitoring network traffic
- When working with evidence obtained under protective orders
Step-by-Step Air-Gapped Setup#
Step 1: Prepare the Air-Gapped Machine#
- Start with a clean macOS installation on an Apple Silicon Mac
- Disable Wi-Fi in System Settings > Wi-Fi > Turn Wi-Fi Off
- Disable Bluetooth in System Settings > Bluetooth > Turn Off (if not needed for peripherals)
- Remove any Ethernet connections
- Verify isolation: Open Safari and confirm you cannot reach any website
Step 2: Install FrameCounsel Offline#
- On a separate, connected machine, download the FrameCounsel
.dmgfrom your license portal - Copy the
.dmgto a USB flash drive or your Pro-G40 evidence drive - On the air-gapped machine, open the
.dmgand install FrameCounsel - Delete the
.dmgfrom the transfer media after installation
Step 3: Activate Your License Offline#
- On the air-gapped machine, launch FrameCounsel. It will display an offline activation code.
- On a separate, connected device (phone or another computer), go to your license portal
- Enter the offline activation code to receive an activation response
- Type or copy the activation response into the air-gapped machine
- FrameCounsel is now activated with no network connection required
Step 4: Configure the Evidence Vault#
- Connect your Pro-G40 evidence drive to the air-gapped Mac
- Set the workspace location to the evidence drive (see "Setting Up Your Evidence Vault" above)
- Enable workspace encryption
Step 5: Import Evidence#
- Obtain evidence files on a separate USB drive or transfer them via the Pro-G40
- Import files into FrameCounsel using File > Import Evidence
- FrameCounsel computes SHA-256 hashes immediately upon import
- All AI analysis runs locally on the Mac's Neural Engine with zero network dependency
Step 6: Verify Air-Gap Integrity#
- Periodically check Activity Monitor > Network to confirm zero network activity
- FrameCounsel's status bar shows a shield icon when operating in confirmed air-gapped mode
- If any network interface becomes active, FrameCounsel will alert you immediately
Air-Gap Discipline
An air-gapped machine is only as secure as the discipline around it. Never connect a USB drive to the air-gapped machine that has been used on an untrusted computer. Never enable Wi-Fi "just for a moment." Never install software from unverified sources. The air gap protects your client's data only if it remains unbroken.
Encryption at Rest#
FrameCounsel encrypts all case data at rest using AES-256 encryption:
- Case database - SQLite database files are encrypted with a per-case key
- Evidence files - Imported media files are stored in an encrypted container
- Temporary files - Processing artifacts are encrypted and securely deleted after use
- Export staging - Files queued for export are encrypted until the export completes
Encryption keys are derived from your macOS Keychain credentials and are never stored in plaintext. On Macs with the Secure Enclave (all Apple Silicon Macs), keys are hardware-protected.
Backup Encryption
If you back up your workspace using Time Machine or another backup tool, ensure the backup destination is also encrypted. FrameCounsel's encryption protects data within the application, but backup copies of the encrypted container should be independently secured. We recommend backing up to a second Pro-G40 with hardware encryption enabled rather than to a network-attached backup destination.
Secure Workspace Setup#
Configure your workspace for maximum security:
- Dedicated user account - Create a separate macOS user account for FrameCounsel work, reducing the risk of accidental data exposure
- FileVault - Enable macOS FileVault for full-disk encryption as an additional layer
- Screen lock - Configure aggressive screen lock timeouts when working with sensitive cases
- Workspace location - Store your workspace on an encrypted external SSD (we recommend the Pro-G40) that can be physically secured when not in use
- Disable cloud services - Turn off iCloud Drive, Dropbox, Google Drive, OneDrive, and any other cloud sync service on the machine where you work with case data. These services can silently upload files from your Desktop and Documents folders.
- Disable Spotlight indexing of the evidence drive to prevent case data from appearing in system-wide search results
Cloud Storage Is a Leak Vector
macOS cloud sync services like iCloud Drive can automatically upload files from your Desktop and Documents folders. If your FrameCounsel workspace is in one of these locations, case data could be silently transmitted to Apple's servers. Always store your workspace on an external evidence drive or in a folder that is explicitly excluded from all cloud sync services.
Access security settings from Settings > Security or press and navigate to the Security tab.
Why Zero-Cloud Is Non-Negotiable#
The legal profession's rush to adopt cloud tools is creating a ticking time bomb of privilege waivers and data exposure. Consider the following:
- A single paste into ChatGPT could waive privilege for that communication and open the door to broader discovery
- Cloud forensic tools transmit your evidence to servers where it is processed alongside data from other users, including potentially from opposing counsel or law enforcement
- Data breaches at cloud providers are not hypothetical; they happen regularly and expose customer data to unauthorized parties
- Government access requests to cloud providers are routine; your case strategy could be accessible via a warrant served on your AI tool provider
- Terms of service change without notice; a cloud provider that does not train on your data today may change that policy tomorrow
The only air-tight guarantee is architecture, not policy. FrameCounsel is engineered so that it is physically impossible for your data to leave your machine. There is no server to breach, no API to intercept, no employee who can access your case files. This is not a feature. It is the foundation.
Security Standards#
FrameCounsel's air-gapped architecture eliminates the risks that compliance frameworks were designed to manage. Instead of checking boxes, we eliminated the problem:
- Attorney-client privilege preserved by architecture — data physically cannot leave your machine
- State bar ethical obligations exceeded — zero risk of inadvertent disclosure through cloud APIs
- Court protective orders enforced by design — evidence stays on hardware you physically control
- Zero cloud, zero servers, zero data transfer — nothing to comply with because nothing leaves your machine
- SHA-256 chain of custody — cryptographic proof of evidence integrity from import to court
Next Steps#
Explore Chain of Custody to learn how FrameCounsel maintains court-admissible evidence integrity, or visit Integrations to learn how FrameCounsel connects with your existing case management workflows.