PrivBatch claims your files never leave your browser. Here's how to confirm it in DevTools in under 60 seconds.
Works the same in any modern browser. Steps below use the standard menu paths.
F12 to open DevTools. On Safari, enable the Develop menu first (Settings → Advanced → Show features for web developers), then Option+Cmd+I.Preserve log at the top of the Network panel and refresh the page. You will see exactly which requests fire during load and nothing fires after.
The panel below wires the same network interception API that powers the Prove It toggle on every tool page. It wraps window.fetch and XMLHttpRequest.prototype.open, counts every call, and updates a live readout. Press the button to run a real JSON formatter operation on a sample payload, in this page, in your browser.
If this counter shows anything other than 0 after the test, file a bug.
This is not a privacy policy. It is what the code can and cannot do.
All PrivBatch tools are static HTML, CSS, and JavaScript served from Cloudflare's edge network. There is no backend. There is no application server. There is no API endpoint for "process this file". The build process is "copy files to a CDN". The runtime is your browser.
Every transformation, conversion, hash, encode, format, and parse runs inside the page using standard Web APIs: FileReader, Blob, TextDecoder, Web Crypto, URL.createObjectURL. The libraries that do the heavy lifting (Papa Parse for CSV, SheetJS for Excel, jsPDF for PDFs, JSZip for ZIPs) are pure-JavaScript and run in-process. They take a string or buffer in, they give a string or buffer out.
The only network requests PrivBatch ever makes are:
api.gumroad.com when a Pro user enters a licence key, to verify the key is valid. This is documented in /privacy.html. Free users never trigger this.After the page has loaded, processing has nothing to call. There is no server endpoint that accepts your data. If you blocked every outbound request with uBlock Origin or a system firewall, every tool would still work, because the work happens between your keyboard and the V8 engine inside the tab.
You do not have to take any of this on faith. Open DevTools, click the Sources tab (or Debugger in Firefox), and read the JavaScript that is actually running. PrivBatch ships its scripts unobfuscated and unbundled. js/gold-standard.js, js/utils.js, and the per-tool inline scripts are the entire program. Search them for fetch( and XMLHttpRequest and audit every call site.
A public source mirror lives at github.com/PrivBatch/PrivBatch if you want to read the code outside a browser tab.
If you spot a request from a PrivBatch tool that sends user data anywhere, that is a bug, not a feature. Email privbatch@proton.me with the network log attached. We will fix it before sunset that day.
For the full privacy policy, see /privacy.html. For the licence terms, see /licence.html.