Most online PDF tools are not as safe as they appear. The majority upload your files to remote servers for processing, creating real privacy and security risks for sensitive documents. The safest approach is using browser-based tools like CipherForces that process everything locally on your device.
Table of Contents
- How Most Online PDF Tools Actually Work
- The Real Risks of Uploading Your PDFs
- What the Privacy Policies Actually Say
- How to Check If a Tool Uploads Your Files
- Server-Based vs. Browser-Based: A Direct Comparison
- The Types of Documents You Should Never Upload
- How CipherForces Does It Differently
- Try It Now
- Frequently Asked Questions
How Most Online PDF Tools Actually Work
When you use a typical online PDF tool — iLovePDF, Smallpdf, PDF2Go, or dozens of others — here's what actually happens:
- You select your file from your computer.
- Your browser uploads the entire file to the tool's server.
- The server processes the file (compresses, merges, converts, etc.).
- The server sends the processed file back to your browser.
- You download the result.
During this process, your original file and the processed version both exist on someone else's server. How long they stay there depends on the service.
This model exists because it's easier and cheaper for the tool provider. Server-side processing uses mature libraries in languages like Python and Java. Browser-based processing requires more engineering effort with JavaScript and WebAssembly. Most companies take the easier route.
The convenience of these tools hides a fundamental problem: your private documents are being transmitted to and stored on infrastructure you don't control.
The Real Risks of Uploading Your PDFs
Data Breaches
Every server is a potential breach target. The more files a service stores — even temporarily — the more attractive it becomes to attackers. PDF tools process millions of documents daily, making their servers high-value targets containing financial documents, legal contracts, and personal records.
Employee Access
Server-side files can potentially be accessed by the company's employees. While reputable services have access controls, the technical capability exists. For truly sensitive documents, the safest file is one that never leaves your device.
Government Requests
Files stored on servers are subject to legal requests from law enforcement and government agencies. If a PDF tool's servers are in a different jurisdiction, your documents may be subject to laws you're not even aware of.
Retention Beyond Promises
Privacy policies promise deletion after processing, but technical failures, backup systems, and caching layers can preserve files beyond stated retention periods. You have no way to verify that your file was actually deleted.
Man-in-the-Middle Attacks
While HTTPS encrypts the transmission, corporate proxies, compromised networks, and SSL interception tools can potentially expose files in transit. This risk is entirely eliminated when files never leave your device.
Third-Party Processing
Some PDF tools outsource the actual processing to third-party APIs. Your file might pass through multiple services before returning to you, each with its own privacy policy and security posture.
What the Privacy Policies Actually Say
Let's look at what the popular tools disclose about file handling.
iLovePDF states files are stored for up to two hours on their servers and then deleted. They process files on servers located in the European Union. Their premium plans offer "enhanced security" — implying the free tier has less.
Smallpdf keeps files for one hour, processed on their own servers. They're transparent about the server-based model but don't offer a local processing option.
Adobe Acrobat Online processes files on Adobe's cloud infrastructure. Files are subject to Adobe's broader privacy policy, which covers data use across their product ecosystem.
PDF2Go stores files for 24 hours. That's an entire day where your document sits on their server.
Notice a pattern? Every service retains your files for some period. The question isn't whether your file is stored — it's how long, and whether you trust the deletion actually happens.
How to Check If a Tool Uploads Your Files
You don't have to take anyone's word for it. Here's how to verify for yourself.
Method 1: Browser Developer Tools
- Open the PDF tool's website.
- Press F12 (or right-click > Inspect) to open developer tools.
- Click the Network tab.
- Process a file through the tool.
- Look at the network requests.
If you see large POST requests (matching the size of your file) being sent to a server, your file is being uploaded. A truly browser-based tool shows no large outgoing requests during processing.
Method 2: Disconnect Test
- Load the tool's web page.
- Disconnect from the internet (turn off Wi-Fi, enable airplane mode).
- Try processing a file.
If the tool works offline, it's genuinely browser-based. If it fails, a server is required, which means your file gets uploaded when you're online.
Method 3: Check File Size Transfer
In the Network tab of developer tools, look at the total data transferred during processing. If it roughly matches twice your file size (upload + download), the file was sent to a server and back.
Server-Based vs. Browser-Based: A Direct Comparison
| Aspect | Server-Based (iLovePDF, Smallpdf) | Browser-Based (CipherForces) |
|---|---|---|
| File location during processing | Remote server | Your device |
| Upload required | Yes | No |
| File retention | Minutes to hours | None (never uploaded) |
| Breach risk | Server is a target | No server target exists |
| Works offline | No | Yes (after page load) |
| Processing speed | Depends on internet | Depends on your device |
| Employee access possible | Yes | No |
| Government request exposure | Yes | No |
| Third-party involvement | Often | Never |
The Types of Documents You Should Never Upload
Some documents carry too much risk for server-based processing:
Legal documents. Contracts, NDAs, litigation files, and legal correspondence contain privileged information. Uploading them to a third-party server could compromise attorney-client privilege.
Financial records. Tax returns, bank statements, investment records, and loan applications contain account numbers, income figures, and personal identifiers.
Medical documents. Health records, insurance claims, and prescription information are protected by privacy regulations. Uploading them to a PDF tool may violate compliance requirements.
HR documents. Employee records, performance reviews, salary information, and disciplinary files are confidential. A breach affecting these documents has serious legal and ethical consequences.
Government filings. Immigration documents, security clearance paperwork, and official forms contain sensitive personal data that requires careful handling.
Intellectual property. Patent applications, trade secrets, proprietary research, and unreleased product designs should never sit on a third-party server.
For all of these document types, browser-based processing is the only approach that eliminates upload risk entirely.
How CipherForces Does It Differently
CipherForces built its entire tool suite — all 68 browser-based tools — around a simple principle: your files stay on your device.
Every tool processes files using JavaScript and WebAssembly running in your browser. The processing code downloads to your machine when you load the page. After that, your files are read, processed, and saved without any server involvement.
This isn't a premium feature or an optional privacy mode. It's the fundamental architecture. There is no server to upload to because CipherForces doesn't operate file processing servers. The infrastructure doesn't exist.
No upload, no server, no risk. This applies to the PDF Compressor, PDF Merger, PDF Splitter, and every other tool in the suite.
The free version has no daily limits, no watermarks, and no account requirement. The full suite of 68 tools is available for a one-time $39 payment — not a subscription. Compare that to iLovePDF at $7/mo or Smallpdf at $9/mo, both of which upload your files to their servers.
Try It Now
Stop uploading your documents to servers you don't control. Open any CipherForces tool and process your files privately. Your documents never leave your browser, period.
Want to learn which specific tools to use? Read our guide to the best free PDF tools that don't upload your files.
Frequently Asked Questions
Is iLovePDF safe to use?
iLovePDF uploads your files to their servers for processing and states that files are stored for up to two hours before deletion. For non-sensitive documents, this level of risk may be acceptable. For contracts, financial records, medical documents, or anything confidential, browser-based tools that never upload your files are a fundamentally safer choice. You can't breach a file that was never uploaded.
Do online PDF tools keep my files?
Most server-based tools retain files for a temporary period — anywhere from one hour to 24 hours depending on the service. Some backup systems may preserve copies longer. Browser-based tools like CipherForces never upload your files in the first place, so there's nothing to retain, no deletion to trust, and no retention period to worry about.
How can I tell if a PDF tool uploads my files?
Open your browser's developer tools by pressing F12, go to the Network tab, and process a file. If you see large POST requests matching the size of your file, it's being uploaded. Alternatively, disconnect from the internet after loading the page and try processing a file. If the tool still works offline, it's genuinely browser-based. If it fails, a server is involved.
What is the safest way to edit PDFs online?
Use browser-based tools that process files locally on your device. CipherForces offers 68 tools — including compression, merging, splitting, signing, and more — that all process files in your browser. No upload, no server, no risk. You can verify this using the developer tools method described above. The processing code runs on your own machine, so your documents never leave your control.

