In 2024, a well-known "online PDF tool" was found to have a server misconfiguration exposing over 200GB of user-uploaded documents publicly — including contracts, passports, and medical reports. The victims weren't tech-illiterate — they just took convenience and trusted a "legitimate-looking" tool.
This article breaks down the real attack surface of file privacy across 5 layers, with an actionable checklist.
Layer 1: The File Itself — Choose Local Processing
The most effective privacy protection is "the file never leaves your device."
- Not all "online tools" need to upload files — good tools use JS/WebAssembly in-browser;
- Test: F12 → Network panel; no large POST during processing means local;
- Rule: contracts, IDs, financial reports, medical records, source code — never upload.
🔍 Real Case
In 2023, a law firm employee uploaded client contracts to a free PDF-to-Word site. Six months later, search engines had crawled and indexed the contents. The firm paid $300K in damages.
Layer 2: Transport — Verify HTTPS
- Check URL starts with https://, lock icon in address bar;
- Don't process sensitive files on public WiFi;
- On untrusted networks, use a VPN before browsing;
- Always click Cancel on "certificate not trusted" warnings.
Layer 3: Temp File Cleanup
Files may leave copies in multiple places:
- Downloads folder, browser cache, browser history, system temp folder, clipboard.
Routine: clean Downloads weekly, browser cache monthly, sensitive files via Shift+Delete.
Layer 4: Browser and Device State
Browser Extensions: The Biggest Hidden Threat
- Many extensions request "read all web content" permission;
- Malicious extensions can silently exfiltrate your data;
- "Acquired extensions" — new owners may inject data collection.
Tip: clean extensions every 3 months; use private window with no extensions for sensitive files.
System Level
- Keep OS and browser updated;
- Enable disk encryption (BitLocker / FileVault).
Layer 5: Sharing and Distribution
Be Careful with "Share Link"
- "Anyone with the link can access" is extremely dangerous;
- Use "specific accounts" over "by link" whenever possible;
- If link is required, set expiration.
Email Attachments
- Email attachments are not encrypted;
- Sensitive attachments: password-zip first, send password via separate channel;
- Professional: PGP encryption.
Recommendations by Sensitivity Level
| Level | Files | Approach |
| Critical | Contracts, passports, financials, source | Desktop software preferred |
| High | IDs, medical records | Local tools only |
| Medium | Resumes, internal docs | Local first, cloud only with reputable |
| Low | Public PDFs | Any |
About hebing.org's Privacy Commitment
All 30 of our tools strictly use browser-local processing. Your files are never uploaded; we have no storage capability. See full /privacy.html.
Conclusion
File privacy isn't a single-point defense — it's a 5-layer defense-in-depth system.