Talk to an Expert

Tell us about your stack and the privacy problems you're trying to solve. We typically respond within one business day.

Prefer to skip the form? Pick a time on our calendar →
or send a message
  • PII in Vector Embeddings: A Defense Guide

    Embeddings look like 'just numbers' — but recent research shows they're partially invertible. A practical defense guide for teams running vector stores against PII recovery attacks.

  • Building a HIPAA-Compliant Medical Chatbot

    Why generic RAG chatbots fail HIPAA — and a step-by-step blueprint for building a medical chatbot that satisfies Safe Harbor at ingestion, retrieval, and inference. With BAA considerations and a self-hosted-LLM alternative.

  • Building a Privacy-Aware RAG System

    RAG pipelines have two distinct PII leak vectors: ingestion and inference. A defense-in-depth blueprint with code, using Philter, Philter AI Proxy, and the rest of the Philterd toolkit.