Terraphim
v1.16.0
Terraphim
Capabilities privacy local-first offline architecture

Privacy by Architecture, Not by Policy

Terraphim AI is not "privacy-respecting" because of a terms-of-service promise. It is private because the architecture makes data exfiltration structurally impossible. All indexing, searching, and knowledge graph traversal happens entirely on your device. There is no cloud dependency, no telemetry, no analytics phone-home.

Design Principles

The search architecture is deliberately non-neural and offline-first:

PrincipleWhat It Means
Offline-firstNo network calls or LLM inference required at search time
DeterministicSame query plus same corpus equals same results, always
ExplainableEvery score decomposes into frequency counts, field weights, or set overlaps
Low footprintApproximately 15-20 MB RAM for a typical knowledge graph; no GPU, no float vectors
Graph-nativeExplicit edges and nodes encode domain relationships, not latent geometry

No Account Required

There is no sign-up, no API key, no subscription. You install Terraphim and it works. Your search history, your knowledge graphs, your indexed documents -- all of it stays on your machine under your control.

How It Compares

Traditional enterprise search tools upload your data to cloud servers, process it with proprietary models, and return results through APIs that require authentication and ongoing payment. Terraphim inverts this model entirely:

  • Data stays on device -- not uploaded, not cached remotely, not used for training
  • Works offline -- full functionality without an internet connection
  • Zero telemetry -- no usage tracking, no analytics, no fingerprinting
  • No vendor lock-in -- open source, standard formats, portable knowledge graphs

Deployment Options

Terraphim runs wherever you need it: as a native desktop application, a WebAssembly module in your browser, a CLI tool, or a TUI (terminal user interface). For teams that need shared access, Terraphim Private Cloud uses AWS Firecracker microVMs to give each user a dedicated virtual machine with their own TLS certificate -- keeping data isolated even in multi-tenant deployments.

Learn More