Summarize a PDF whose binary never leaves your browser.
Only the extracted text passages travel — never the file itself.
pdf.js parses locally. The AI synthesis runs server-side on text passages only.
This page treats privacy as a technical claim you can verify. The PDF is parsed by pdf.js in your browser; the file binary, embedded fonts, and images never traverse the network. When you trigger summarization, the request sent to the AI carries only the extracted text passages required for synthesis — not the document itself.
If you handle NDA-bound material or regulated records, removing the file upload from the threat model is the meaningful reduction: no server-side copy of the PDF, no holding window, no third-party storage of the document. Pair it with end-to-end encrypted transfer when you need to share the original alongside the summary.
Why "no upload" actually matters
Privacy isn't an aesthetic — it's a constraint. These are the situations where uploading the PDF is not a trade-off, it's a non-starter.
How to verify the file binary doesn't upload
Treat this like a security audit. Three steps, thirty seconds — you check the request payload yourself.
What runs in your browser vs server-side
Four stages run client-side; one runs on a hosted LLM. The split is intentional and the boundary is the only thing that travels over the network.
Cloud upload vs in-browser
Same end result — a summary of your PDF — produced by two architectures with very different threat models.
- The full PDF binary traverses the public internet to a server you don't control.
- A server-side process holds the file (even briefly) in storage you can't audit.
- Embedded fonts, images, and metadata travel along with the document text.
- File-retention windows, access logs, and breach exposure all apply to the binary.
- The provider sees the document's filename, size, and structure, not just its content.
- The PDF binary stays in the browser tab — pdf.js parses it locally.
- No server-side copy of the file ever exists. There is nothing to retain or leak.
- Embedded fonts, images, and metadata never travel over the network.
- Only the extracted text passages required for the requested summary are sent to the AI.
- Page citations are derived in your browser from local source positions, then linked back to the AI's bullets.
- Closing the tab releases the parsed PDF from memory — there is no server-side trace of the file.
When keeping the file binary local matters
Some workflows treat the full document — fonts, images, embedded metadata — as more sensitive than its plain text. These are the contexts where the file-vs-passages distinction is the requirement.
Related privacy-first PDF tools
All of these keep the PDF binary in the browser. Some are fully client-side (compress, convert); the AI tools send only extracted text passages.
Frequently asked questions
Can I really verify the file doesn't upload?
Does the summarizer need an internet connection?
What about the AI model — isn't it server-hosted?
Why does the page take a moment to load before I can drop a file?
Is there a file-size limit?
Summarize your PDF without uploading the file.
Open the summarizer, drop a file, read the summary. Then open DevTools, inspect the request payload, and confirm: text passages, not the binary.
summarizeOpen the Summarizer