We assume the network is compromised, the cloud is untrusted, and your privacy is absolute. Here's how we build for that reality.
Security Model v2.1 // December 2025
ACE.Pro is built on a "Local-First" security model. This is not a feature—it is the foundation of our entire architecture. Every cryptographic operation, every file scan, every index update happens on your machine. Your data never touches our servers because we have no servers for it to touch.
The implications of this design:
Air-gap compatible. Zero cloud dependency.
Fast non-cryptographic hash for quick equality checks. Processes at 30GB/s.
Cryptographic verification for confirmed duplicates. SIMD-accelerated.
File deduplication requires comparing content, not names. ACE.Pro uses a **two-tier hashing strategy** to balance speed and cryptographic security:
Merkle Tree Chunking: Large files (1GB+) are split into 4MB chunks. Each chunk is hashed independently, allowing us to verify a 100GB video file by checking its chunk tree rather than rehashing the entire file on every scan.
This approach means we can identify a duplicate 80GB RAW video file in under 200ms, even on a spinning HDD.
Your ACE.Pro index database (SQLite/RocksDB) contains metadata about your files: names, paths, sizes, and content hashes. While this is not the file content itself, it is still sensitive. Therefore, the index is encrypted at rest using AES-256-GCM.
The encryption key is derived from your system's **Hardware Security Module**:
This means: If someone steals your laptop and dumps the hard drive, they cannot decrypt the ACE.Pro index. They will not see your file names, folder structures, or metadata. The key never leaves your hardware.
• Generic error codes (not stack traces)
• Feature usage counts (aggregated)
• Performance metrics (anonymized)
✓ Differential privacy applied
✓ No file names or paths
✓ No device fingerprinting
"We add statistical noise to ensure no single user can be identified."
ACE.Pro is designed to function 100% offline. However, for users who opt in, we collect minimal, anonymized telemetry to improve the product. This telemetry is:
Air-Gap Deployment: Enterprise users can deploy ACE.Pro on fully isolated networks. The software will continue to function with zero degradation. No license checks phone home.
We take security seriously. If you have questions or want to report a vulnerability, contact our security team.
Contact Security TeamResponsible Disclosure: security@acepro.com