Bank-level security meets zero-knowledge architecture. We built LexAI so that even we cannot access your confidential legal data.

Unlike traditional cloud services, LexAI uses zero-knowledge architecture inspired by Proton Mail. Your data is encrypted before it ever leaves your device, using keys that only you control. Even our own engineers cannot access your confidential legal information.
Your data is encrypted on your device before transmission. Only you have the decryption keys.
Architecture designed to maintain privilege. No third-party access to your confidential communications.
Same security principles used by Proton Mail, trusted by journalists and activists worldwide.
Our security model is documented and can be independently verified by security researchers.
A single master key that only you possess unlocks your encrypted vault. Without it, your data remains permanently inaccessible -even to us.
Your master password generates a unique cryptographic key using PBKDF2 with 600,000+ iterations. This key never leaves your device and is never transmitted to our servers.
Military-grade encryption standard used by governments worldwide. The same encryption protecting classified information now protects your legal work.
Each document has unique encryption keys derived from your master key. Compromising one document doesn't compromise others.
If you lose your master key, we cannot recover your data. This is a feature, not a bug -it proves no one else can access your data either.
Session keys are ephemeral and rotated regularly. Even if a key is compromised, past and future sessions remain protected.
Support for hardware security keys (YubiKey, etc.) for additional authentication layer and protection against phishing attacks.
Flexible authentication options from simple 2FA to hardware-backed biometrics
TOTP authenticator apps (Google Authenticator, Authy) with encrypted secrets and replay protection for an extra layer of security.
Face ID, Touch ID, Windows Hello - passwordless login via WebAuthn with phishing resistance and hardware-backed credentials.
Automatic logout after inactivity with 2-minute warning, desktop notifications, and configurable duration for enterprise control.
8 single-use recovery codes, SHA-256 hashed, for account recovery when your 2FA device is unavailable.
FIDO2 hardware keys (YubiKey) for maximum protection against credential theft and phishing attacks.
Instant notifications of new logins with device and location info so you always know when your account is accessed.
Complete control over session lifecycle with advanced timeout warnings, secure cleanup procedures, and comprehensive activity monitoring.
Stay logged in with password or biometric re-verification without losing your work.
Complete session cleanup with token invalidation, cache clearing, and worker termination.
View and revoke sessions across all devices from your security dashboard.
Smart activity monitoring resets timeout on keyboard, mouse, and touch interactions.
Your Data Is Not Our Product
Many "free" AI services monetize user data through advertising, training AI models, or selling to third parties. LexAI is different. We're a subscription business -our only revenue comes from providing you excellent service, not from exploiting your confidential legal information.
We never sell, license, or share your data with any third party. Your data stays yours.
Your documents are never used to train our AI or any third-party models. Ever.
Zero ads. Zero tracking for ad purposes. We make money from subscriptions, not surveillance.
We collect only what's necessary to provide service. Less data = less risk.
Zero-knowledge architecture isn't just a security feature -it's a guarantee that attorney-client privilege remains intact.
Even if compelled - we technically cannot access your encrypted conversations and documents.
All data stored in Frankfurt, processed in Germany. No data ever leaves the EU.
No identity verification, no IP logging, payments via Stripe. We know almost nothing about you.
Your master key never leaves your device. Only you can decrypt your conversation history.
Powered by Stripe
All billing, payments, subscriptions, and invoicing are handled entirely by Stripe - one of the world's most trusted payment processors. Your credit card details never touch our servers - not even during the free trial. If you cancel, we never had your payment data.
Stripe processes billions of dollars annually and is trusted by millions of businesses worldwide for secure payment handling.
Most cloud AI services weren't built with legal confidentiality in mind. Here's what typically happens -and why we do things differently.
Unlike typical AI services that use your queries to improve their models, we never train on your data.
No CLOUD Act exposure. No FISA requests. Your data is protected by EU privacy laws only.
Zero-knowledge encryption means we mathematically cannot read your data - not "we promise not to."
We run our own AI on our own servers. Your queries never pass through OpenAI or other providers.
Your data is stored in Supabase's Frankfurt data center -a trusted, SOC 2 compliant database provider. AI processing happens on our own Hetzner GPU servers, also in Germany. No sensitive data ever leaves the EU.
Conversations and documents stored in SOC 2 Type II certified Frankfurt data center.
AI and backend processing on our own GPU servers. Queries never leave our infrastructure.
Only the client-side UI runs on Vercel. No sensitive data is processed there.
We run our own AI. Your queries never touch OpenAI, Anthropic, or any third party.
Honest answers about how we protect your data and what we can (and can't) access.
View all FAQs
No. Due to our zero-knowledge architecture, your data is encrypted with keys that only you possess. Even with physical access to our servers, our employees cannot decrypt your data. This is mathematically guaranteed by our encryption design -we literally cannot access your information.
If you lose your master key without a backup, your data cannot be recovered -by you or by us. This is intentional: it proves no one else can access your data either. We strongly recommend using our secure recovery key feature and storing backups in a safe location.
Here's exactly what we could provide: encrypted data we cannot decrypt, plus the username you chose during signup (which we don't verify -it could be fake). That's it. We don't log IP addresses during normal use, we don't verify identities, and payments go through Stripe so we don't have your card details. Even if compelled by law, we simply don't have useful information to hand over.
Even in a breach scenario, attackers would only obtain encrypted data. Without your master key (which is never transmitted to us), your data remains protected. This is the core benefit of zero-knowledge architecture -it protects you even if we fail.
No tracking during normal use. We only log IP addresses when our security systems detect potential threats -like brute force attacks or suspicious activity. Legitimate users going about their work will never have their IP logged. We don't use analytics trackers, we don't build user profiles, and we don't monitor what you do in the app.
Our security team is here to answer your questions and provide documentation for your compliance reviews.
For urgent security concerns, email support@lexaitechnologies.com directly.
English or Czech / Anglicky nebo česky