Releases: dataiku/kiji-proxy
Kiji Privacy Proxy v1.0.0
Kiji Privacy Proxy v1.0.0
Downloads
- macOS: DMG installer (Apple Silicon and Intel) - Desktop app with UI
- Linux: Standalone binary archive (amd64) - API server only (no UI)
- Chrome Extension: Browser extension for PII detection in web forms
macOS Installation
Quick Start:
- Download
Kiji-Privacy-Proxy-1.0.0.dmg - Open the DMG and drag to Applications
- Launch "Kiji Privacy Proxy"
HTTPS Support - Install CA Certificate:
For HTTPS interception to work, you must trust the proxy's CA certificate:
# System-wide trust (recommended)
sudo security add-trusted-cert \
-d \
-r trustRoot \
-k /Library/Keychains/System.keychain \
~/.kiji-proxy/certs/ca.crtOr use Keychain Access:
- Open Keychain Access app
- File → Import Items →
~/.kiji-proxy/certs/ca.crt - Double-click "Kiji Privacy Proxy CA" certificate
- Expand Trust → Set to Always Trust
Linux Installation
Note: Linux build is API-only (no desktop UI). Access via HTTP endpoints.
Quick Start:
# Extract
tar -xzf kiji-privacy-proxy-1.0.0-linux-amd64.tar.gz
cd kiji-privacy-proxy-1.0.0-linux-amd64
# Run
./run.shHTTPS Support - Install CA Certificate:
# Ubuntu/Debian
sudo cp ~/.kiji-proxy/certs/ca.crt /usr/local/share/ca-certificates/kiji-proxy-ca.crt
sudo update-ca-certificates
# RHEL/CentOS/Fedora
sudo cp ~/.kiji-proxy/certs/ca.crt /etc/pki/ca-trust/source/anchors/kiji-proxy-ca.crt
sudo update-ca-trustConfiguration:
# Set API key
export OPENAI_API_KEY="your-key-here"
# Check health
curl http://localhost:8080/health
# Test proxy
curl -x http://localhost:8080 https://api.openai.com/v1/modelsSee included README.txt for systemd service setup and advanced configuration.
Chrome Extension
Install from zip:
- Download
kiji-privacy-proxy-extension-1.0.0.zip - Unzip to a folder
- Open
chrome://extensions/ - Enable Developer mode
- Click Load unpacked and select the unzipped folder
Documentation
What's New
See the changelog below for details.
What's Changed
- fix: updated hf upload by @hanneshapke in #375
- doc: update docs by @hanneshapke in #381
- fix: updated model versions by @hanneshapke in #382
- fix: updated proxy setup by @hanneshapke in #383
- chore: add 1.0.0 release changeset by @Davidnet in #384
- chore: version packages by @hanneshapke in #385
Full Changelog: v0.6.1...v1.0.0
Kiji Privacy Proxy v0.6.1
Kiji Privacy Proxy v0.6.1
Downloads
- macOS: DMG installer (Apple Silicon and Intel) - Desktop app with UI
- Linux: Standalone binary archive (amd64) - API server only (no UI)
- Chrome Extension: Browser extension for PII detection in web forms
macOS Installation
Quick Start:
- Download
Kiji-Privacy-Proxy-0.6.1.dmg - Open the DMG and drag to Applications
- Launch "Kiji Privacy Proxy"
HTTPS Support - Install CA Certificate:
For HTTPS interception to work, you must trust the proxy's CA certificate:
# System-wide trust (recommended)
sudo security add-trusted-cert \
-d \
-r trustRoot \
-k /Library/Keychains/System.keychain \
~/.kiji-proxy/certs/ca.crtOr use Keychain Access:
- Open Keychain Access app
- File → Import Items →
~/.kiji-proxy/certs/ca.crt - Double-click "Kiji Privacy Proxy CA" certificate
- Expand Trust → Set to Always Trust
Linux Installation
Note: Linux build is API-only (no desktop UI). Access via HTTP endpoints.
Quick Start:
# Extract
tar -xzf kiji-privacy-proxy-0.6.1-linux-amd64.tar.gz
cd kiji-privacy-proxy-0.6.1-linux-amd64
# Run
./run.shHTTPS Support - Install CA Certificate:
# Ubuntu/Debian
sudo cp ~/.kiji-proxy/certs/ca.crt /usr/local/share/ca-certificates/kiji-proxy-ca.crt
sudo update-ca-certificates
# RHEL/CentOS/Fedora
sudo cp ~/.kiji-proxy/certs/ca.crt /etc/pki/ca-trust/source/anchors/kiji-proxy-ca.crt
sudo update-ca-trustConfiguration:
# Set API key
export OPENAI_API_KEY="your-key-here"
# Check health
curl http://localhost:8080/health
# Test proxy
curl -x http://localhost:8080 https://api.openai.com/v1/modelsSee included README.txt for systemd service setup and advanced configuration.
Chrome Extension
Install from zip:
- Download
kiji-privacy-proxy-extension-0.6.1.zip - Unzip to a folder
- Open
chrome://extensions/ - Enable Developer mode
- Click Load unpacked and select the unzipped folder
Documentation
What's New
See the changelog below for details.
What's Changed
- fix: updated release flow and local dmg build by @hanneshapke in #372
- fix: correct uri for unquantized model by @Davidnet in #373
- chore: version packages by @hanneshapke in #374
Full Changelog: v0.6.0...v0.6.1
Kiji Privacy Proxy v0.5.4
Kiji Privacy Proxy v0.5.4
Downloads
- macOS: DMG installer (Apple Silicon and Intel) - Desktop app with UI
- Linux: Standalone binary archive (amd64) - API server only (no UI)
- Chrome Extension: Browser extension for PII detection in web forms
macOS Installation
Quick Start:
- Download
Kiji-Privacy-Proxy-0.5.4.dmg - Open the DMG and drag to Applications
- Launch "Kiji Privacy Proxy"
HTTPS Support - Install CA Certificate:
For HTTPS interception to work, you must trust the proxy's CA certificate:
# System-wide trust (recommended)
sudo security add-trusted-cert \
-d \
-r trustRoot \
-k /Library/Keychains/System.keychain \
~/.kiji-proxy/certs/ca.crtOr use Keychain Access:
- Open Keychain Access app
- File → Import Items →
~/.kiji-proxy/certs/ca.crt - Double-click "Kiji Privacy Proxy CA" certificate
- Expand Trust → Set to Always Trust
Linux Installation
Note: Linux build is API-only (no desktop UI). Access via HTTP endpoints.
Quick Start:
# Extract
tar -xzf kiji-privacy-proxy-0.5.4-linux-amd64.tar.gz
cd kiji-privacy-proxy-0.5.4-linux-amd64
# Run
./run.shHTTPS Support - Install CA Certificate:
# Ubuntu/Debian
sudo cp ~/.kiji-proxy/certs/ca.crt /usr/local/share/ca-certificates/kiji-proxy-ca.crt
sudo update-ca-certificates
# RHEL/CentOS/Fedora
sudo cp ~/.kiji-proxy/certs/ca.crt /etc/pki/ca-trust/source/anchors/kiji-proxy-ca.crt
sudo update-ca-trustConfiguration:
# Set API key
export OPENAI_API_KEY="your-key-here"
# Check health
curl http://localhost:8080/health
# Test proxy
curl -x http://localhost:8080 https://api.openai.com/v1/modelsSee included README.txt for systemd service setup and advanced configuration.
Chrome Extension
Install from zip:
- Download
kiji-privacy-proxy-extension-0.5.4.zip - Unzip to a folder
- Open
chrome://extensions/ - Enable Developer mode
- Click Load unpacked and select the unzipped folder
Documentation
What's New
See the changelog below for details.
What's Changed
- chore: added privacy policy by @hanneshapke in #356
- fix: narrow chrome extension scope for faster store review by @hanneshapke in #357
- chore: new chrome extension by @hanneshapke in #358
- chore: version packages by @hanneshapke in #359
Full Changelog: v0.5.3...v0.5.4
Kiji Privacy Proxy v0.5.3
Kiji Privacy Proxy v0.5.3
Downloads
- macOS: DMG installer (Apple Silicon and Intel) - Desktop app with UI
- Linux: Standalone binary archive (amd64) - API server only (no UI)
- Chrome Extension: Browser extension for PII detection in web forms
macOS Installation
Quick Start:
- Download
Kiji-Privacy-Proxy-0.5.3.dmg - Open the DMG and drag to Applications
- Launch "Kiji Privacy Proxy"
HTTPS Support - Install CA Certificate:
For HTTPS interception to work, you must trust the proxy's CA certificate:
# System-wide trust (recommended)
sudo security add-trusted-cert \
-d \
-r trustRoot \
-k /Library/Keychains/System.keychain \
~/.kiji-proxy/certs/ca.crtOr use Keychain Access:
- Open Keychain Access app
- File → Import Items →
~/.kiji-proxy/certs/ca.crt - Double-click "Kiji Privacy Proxy CA" certificate
- Expand Trust → Set to Always Trust
Linux Installation
Note: Linux build is API-only (no desktop UI). Access via HTTP endpoints.
Quick Start:
# Extract
tar -xzf kiji-privacy-proxy-0.5.3-linux-amd64.tar.gz
cd kiji-privacy-proxy-0.5.3-linux-amd64
# Run
./run.shHTTPS Support - Install CA Certificate:
# Ubuntu/Debian
sudo cp ~/.kiji-proxy/certs/ca.crt /usr/local/share/ca-certificates/kiji-proxy-ca.crt
sudo update-ca-certificates
# RHEL/CentOS/Fedora
sudo cp ~/.kiji-proxy/certs/ca.crt /etc/pki/ca-trust/source/anchors/kiji-proxy-ca.crt
sudo update-ca-trustConfiguration:
# Set API key
export OPENAI_API_KEY="your-key-here"
# Check health
curl http://localhost:8080/health
# Test proxy
curl -x http://localhost:8080 https://api.openai.com/v1/modelsSee included README.txt for systemd service setup and advanced configuration.
Chrome Extension
Install from zip:
- Download
kiji-privacy-proxy-extension-0.5.3.zip - Unzip to a folder
- Open
chrome://extensions/ - Enable Developer mode
- Click Load unpacked and select the unzipped folder
Documentation
What's New
See the changelog below for details.
What's Changed
- fix: include SVG icons in chrome extension release zip by @hanneshapke in #351
- fix: extension without all urls by @hanneshapke in #352
- feat: added version bump to makefile by @hanneshapke in #353
- version bump to 0.5.3 by @hanneshapke in #354
- chore: version packages by @hanneshapke in #355
Full Changelog: v0.5.2...v0.5.3
Kiji Privacy Proxy v0.5.2
Kiji Privacy Proxy v0.5.2
Downloads
- macOS: DMG installer (Apple Silicon and Intel) - Desktop app with UI
- Linux: Standalone binary archive (amd64) - API server only (no UI)
- Chrome Extension: Browser extension for PII detection in web forms
macOS Installation
Quick Start:
- Download
Kiji-Privacy-Proxy-0.5.2.dmg - Open the DMG and drag to Applications
- Launch "Kiji Privacy Proxy"
HTTPS Support - Install CA Certificate:
For HTTPS interception to work, you must trust the proxy's CA certificate:
# System-wide trust (recommended)
sudo security add-trusted-cert \
-d \
-r trustRoot \
-k /Library/Keychains/System.keychain \
~/.kiji-proxy/certs/ca.crtOr use Keychain Access:
- Open Keychain Access app
- File → Import Items →
~/.kiji-proxy/certs/ca.crt - Double-click "Kiji Privacy Proxy CA" certificate
- Expand Trust → Set to Always Trust
Linux Installation
Note: Linux build is API-only (no desktop UI). Access via HTTP endpoints.
Quick Start:
# Extract
tar -xzf kiji-privacy-proxy-0.5.2-linux-amd64.tar.gz
cd kiji-privacy-proxy-0.5.2-linux-amd64
# Run
./run.shHTTPS Support - Install CA Certificate:
# Ubuntu/Debian
sudo cp ~/.kiji-proxy/certs/ca.crt /usr/local/share/ca-certificates/kiji-proxy-ca.crt
sudo update-ca-certificates
# RHEL/CentOS/Fedora
sudo cp ~/.kiji-proxy/certs/ca.crt /etc/pki/ca-trust/source/anchors/kiji-proxy-ca.crt
sudo update-ca-trustConfiguration:
# Set API key
export OPENAI_API_KEY="your-key-here"
# Check health
curl http://localhost:8080/health
# Test proxy
curl -x http://localhost:8080 https://api.openai.com/v1/modelsSee included README.txt for systemd service setup and advanced configuration.
Chrome Extension
Install from zip:
- Download
kiji-privacy-proxy-extension-0.5.2.zip - Unzip to a folder
- Open
chrome://extensions/ - Enable Developer mode
- Click Load unpacked and select the unzipped folder
Documentation
What's New
See the changelog below for details.
What's Changed
- test: add end-to-end evaluation harness for PII detection by @hanneshapke in #338
- feat: update chrome ext by @hanneshapke in #341
- fix: correct BIO labels for multi-word entities by @hanneshapke in #343
- fix: street name generator by @hanneshapke in #344
- feat: ai4privacy benchmark by @hanneshapke in #342
- fix: show Unknown instead of masked value when entity label missing by @hanneshapke in #345
- chore: update base model by @hanneshapke in #346
- chore: add patch changeset for recent PII fixes by @hanneshapke in #348
- chore: version packages by @hanneshapke in #347
- chore: add patch changeset for 0.5.2 re-release by @hanneshapke in #349
- chore: version packages by @hanneshapke in #350
Full Changelog: v0.5.1...v0.5.2
Kiji Privacy Proxy v0.5.1
Kiji Privacy Proxy v0.5.1
Downloads
- macOS: DMG installer (Apple Silicon and Intel) - Desktop app with UI
- Linux: Standalone binary archive (amd64) - API server only (no UI)
- Chrome Extension: Browser extension for PII detection in web forms
macOS Installation
Quick Start:
- Download
Kiji-Privacy-Proxy-0.5.1.dmg - Open the DMG and drag to Applications
- Launch "Kiji Privacy Proxy"
HTTPS Support - Install CA Certificate:
For HTTPS interception to work, you must trust the proxy's CA certificate:
# System-wide trust (recommended)
sudo security add-trusted-cert \
-d \
-r trustRoot \
-k /Library/Keychains/System.keychain \
~/.kiji-proxy/certs/ca.crtOr use Keychain Access:
- Open Keychain Access app
- File → Import Items →
~/.kiji-proxy/certs/ca.crt - Double-click "Kiji Privacy Proxy CA" certificate
- Expand Trust → Set to Always Trust
Linux Installation
Note: Linux build is API-only (no desktop UI). Access via HTTP endpoints.
Quick Start:
# Extract
tar -xzf kiji-privacy-proxy-0.5.1-linux-amd64.tar.gz
cd kiji-privacy-proxy-0.5.1-linux-amd64
# Run
./run.shHTTPS Support - Install CA Certificate:
# Ubuntu/Debian
sudo cp ~/.kiji-proxy/certs/ca.crt /usr/local/share/ca-certificates/kiji-proxy-ca.crt
sudo update-ca-certificates
# RHEL/CentOS/Fedora
sudo cp ~/.kiji-proxy/certs/ca.crt /etc/pki/ca-trust/source/anchors/kiji-proxy-ca.crt
sudo update-ca-trustConfiguration:
# Set API key
export OPENAI_API_KEY="your-key-here"
# Check health
curl http://localhost:8080/health
# Test proxy
curl -x http://localhost:8080 https://api.openai.com/v1/modelsSee included README.txt for systemd service setup and advanced configuration.
Chrome Extension
Install from zip:
- Download
kiji-pii-guard-0.5.1.zip - Unzip to a folder
- Open
chrome://extensions/ - Enable Developer mode
- Click Load unpacked and select the unzipped folder
Documentation
What's New
See the changelog below for details.
What's Changed
- deps(deps-dev): bump postcss from 8.5.6 to 8.5.10 by @dependabot[bot] in #330
- deps(deps-dev): bump electron from 41.2.0 to 41.2.1 by @dependabot[bot] in #333
- ci(deps): bump astral-sh/setup-uv from 8.0.0 to 8.1.0 in the github-actions group by @dependabot[bot] in #332
- deps(deps): bump modernc.org/sqlite from 1.48.2 to 1.49.1 in the go-dependencies group by @dependabot[bot] in #329
- deps(deps-dev): bump webpack-cli from 6.0.1 to 7.0.2 by @dependabot[bot] in #331
- chore: model/quantized/spm.model: convert to Git LFS by @hanneshapke in #336
- deps(deps-dev): bump eslint-plugin-react-hooks from 7.0.1 to 7.1.1 by @dependabot[bot] in #334
- fix(ci): prevent electron-builder auto-publish on tag builds by @hanneshapke in #337
- chore: 0.5.1 release by @hanneshapke in #339
Full Changelog: v0.5.0...v0.5.1
Kiji Privacy Proxy v0.4.11
Kiji Privacy Proxy v0.4.11
Downloads
- macOS: DMG installer (Apple Silicon and Intel) - Desktop app with UI
- Linux: Standalone binary archive (amd64) - API server only (no UI)
- Chrome Extension: Browser extension for PII detection in web forms
macOS Installation
Quick Start:
- Download
Kiji-Privacy-Proxy-0.4.11.dmg - Open the DMG and drag to Applications
- Launch "Kiji Privacy Proxy"
HTTPS Support - Install CA Certificate:
For HTTPS interception to work, you must trust the proxy's CA certificate:
# System-wide trust (recommended)
sudo security add-trusted-cert \
-d \
-r trustRoot \
-k /Library/Keychains/System.keychain \
~/.kiji-proxy/certs/ca.crtOr use Keychain Access:
- Open Keychain Access app
- File → Import Items →
~/.kiji-proxy/certs/ca.crt - Double-click "Kiji Privacy Proxy CA" certificate
- Expand Trust → Set to Always Trust
Linux Installation
Note: Linux build is API-only (no desktop UI). Access via HTTP endpoints.
Quick Start:
# Extract
tar -xzf kiji-privacy-proxy-0.4.11-linux-amd64.tar.gz
cd kiji-privacy-proxy-0.4.11-linux-amd64
# Run
./run.shHTTPS Support - Install CA Certificate:
# Ubuntu/Debian
sudo cp ~/.kiji-proxy/certs/ca.crt /usr/local/share/ca-certificates/kiji-proxy-ca.crt
sudo update-ca-certificates
# RHEL/CentOS/Fedora
sudo cp ~/.kiji-proxy/certs/ca.crt /etc/pki/ca-trust/source/anchors/kiji-proxy-ca.crt
sudo update-ca-trustConfiguration:
# Set API key
export OPENAI_API_KEY="your-key-here"
# Check health
curl http://localhost:8080/health
# Test proxy
curl -x http://localhost:8080 https://api.openai.com/v1/modelsSee included README.txt for systemd service setup and advanced configuration.
Chrome Extension
Install from zip:
- Download
kiji-pii-guard-0.4.11.zip - Unzip to a folder
- Open
chrome://extensions/ - Enable Developer mode
- Click Load unpacked and select the unzipped folder
Documentation
What's New
See the changelog below for details.
What's Changed
- fix: bump go version to use go.mod and mise tool version specified by @Davidnet in #318
- chore: version packages by @hanneshapke in #319
Full Changelog: v0.4.10...v0.4.11
Kiji Privacy Proxy v0.4.11
Kiji Privacy Proxy v0.4.11
Downloads
- macOS: DMG installer (Apple Silicon and Intel) - Desktop app with UI
- Linux: Standalone binary archive (amd64) - API server only (no UI)
- Chrome Extension: Browser extension for PII detection in web forms
macOS Installation
Quick Start:
- Download
Kiji-Privacy-Proxy-0.4.11.dmg - Open the DMG and drag to Applications
- Launch "Kiji Privacy Proxy"
HTTPS Support - Install CA Certificate:
For HTTPS interception to work, you must trust the proxy's CA certificate:
# System-wide trust (recommended)
sudo security add-trusted-cert \
-d \
-r trustRoot \
-k /Library/Keychains/System.keychain \
~/.kiji-proxy/certs/ca.crtOr use Keychain Access:
- Open Keychain Access app
- File → Import Items →
~/.kiji-proxy/certs/ca.crt - Double-click "Kiji Privacy Proxy CA" certificate
- Expand Trust → Set to Always Trust
Linux Installation
Note: Linux build is API-only (no desktop UI). Access via HTTP endpoints.
Quick Start:
# Extract
tar -xzf kiji-privacy-proxy-0.4.11-linux-amd64.tar.gz
cd kiji-privacy-proxy-0.4.11-linux-amd64
# Run
./run.shHTTPS Support - Install CA Certificate:
# Ubuntu/Debian
sudo cp ~/.kiji-proxy/certs/ca.crt /usr/local/share/ca-certificates/kiji-proxy-ca.crt
sudo update-ca-certificates
# RHEL/CentOS/Fedora
sudo cp ~/.kiji-proxy/certs/ca.crt /etc/pki/ca-trust/source/anchors/kiji-proxy-ca.crt
sudo update-ca-trustConfiguration:
# Set API key
export OPENAI_API_KEY="your-key-here"
# Check health
curl http://localhost:8080/health
# Test proxy
curl -x http://localhost:8080 https://api.openai.com/v1/modelsSee included README.txt for systemd service setup and advanced configuration.
Chrome Extension
Install from zip:
- Download
kiji-pii-guard-0.4.11.zip - Unzip to a folder
- Open
chrome://extensions/ - Enable Developer mode
- Click Load unpacked and select the unzipped folder
Documentation
What's New
See the changelog below for details.
What's Changed
- make confidence threshold configurable by @hanneshapke in #199
- store tour in config, block tour until t&c completed by @hanneshapke in #200
- Remove blank script, introduce spinner by @hanneshapke in #201
- Added open source notice by @hanneshapke in #203
- Frontend feedback by @hanneshapke in #202
- Update kiji images by @hanneshapke in #207
- update screenshot by @hanneshapke in #208
- Clean up 20260215 by @hanneshapke in #212
- added hf to docs by @hanneshapke in #213
- Updated Github actions, containers by @hanneshapke in #204
- deps(deps): bump @sentry/electron from 7.5.0 to 7.7.1 by @dependabot[bot] in #218
- deps(deps): bump lucide-react from 0.263.1 to 0.564.0 by @dependabot[bot] in #214
- deps(deps-dev): bump html-webpack-plugin from 5.6.5 to 5.6.6 by @dependabot[bot] in #216
- fixes count of PII in response by @hanneshapke in #209
- Create UI tabs for request/response by @hanneshapke in #210
- fix dmg build issue by @hanneshapke in #224
- deps(deps-dev): bump webpack-cli from 5.1.4 to 6.0.1 by @dependabot[bot] in #215
- deps-dev(deps-dev): bump the development-dependencies group across 1 directory with 17 updates by @dependabot[bot] in #229
- deps(deps): bump the go-dependencies group with 4 updates by @dependabot[bot] in #217
- deps(deps): bump lucide-react from 0.564.0 to 0.574.0 by @dependabot[bot] in #227
- deps(deps): bump react-shepherd from 6.1.9 to 7.0.0 by @dependabot[bot] in #226
- ci(deps): bump the github-actions group with 9 updates by @dependabot[bot] in #220
- Updated dataset and model by @hanneshapke in #211
- created changeset for new release by @hanneshapke in #231
- chore: version packages by @hanneshapke in #232
- new changeset for release by @hanneshapke in #233
- chore: version packages by @hanneshapke in #234
- Release 20260223 v3 by @hanneshapke in #235
- chore: version packages by @hanneshapke in #236
- New ONNX Link by @hanneshapke in #237
- chore: version packages by @hanneshapke in #238
- Release 20260223 v4 by @hanneshapke in #239
- chore: version packages by @hanneshapke in #240
- Release 20260223 v5 by @hanneshapke in #248
- chore: version packages by @hanneshapke in #249
- Merge release jobs by @hanneshapke in #250
- chore: version packages by @hanneshapke in #251
- deps(deps): bump modernc.org/sqlite from 1.46.0 to 1.46.1 in the go-dependencies group by @dependabot[bot] in #246
- deps(deps): bump @sentry/electron from 7.7.1 to 7.8.0 by @dependabot[bot] in #244
- deps(deps): bump @types/dompurify from 3.0.5 to 3.2.0 by @dependabot[bot] in #242
- deps(deps): bump react-shepherd from 7.0.0 to 7.0.3 by @dependabot[bot] in #243
- chore: add make pr command for AI-generated semantic PRs by @hanneshapke in #254
- ci: add semantic PR title enforcement workflow by @hanneshapke in #253
- docs: update README badge to point to combined release workflow by @hanneshapke in #255
- chore: combine dependency updates by @hanneshapke in #278
- fix(data): handle null entity_type in coreference clusters by @hanneshapke in #296
- chore: combine dependency updates by @hanneshapke in #299
- ci(deps): bump astral-sh/setup-uv from 7.5.0 to 8.0.0 by @hanneshapke in #298
- fix(data): shuffle samples before train/val split to prevent ordered-batch bias by @hanneshapke in #280
- feat(data): add AI4Privacy dataset import with label mapping by @hanneshapke in #287
- feat(model): remove coreference resolution task by @hanneshapke in #286
- feat(training): compute class weights from label frequency by @hanneshapke in #281
- feat(model): replace linear heads with deeper MLP classifiers by @hanneshapke in #282
- feat(model): support configurable base encoder for NER by @hanneshapke in #283
- feat(eval): switch to seqeval for entity-level F1 metrics by @hanneshapke in #284
- feat(model): add CRF layer for valid BIO sequence decoding by @hanneshapke in #285
- fix(tokenization): replace substring matching with character offsets from annotations by @hanneshapke in #277
- feat: improve model performance with deberta-v3-base, cosine scheduler, and layer-wise LR decay by @hanneshapke in #300
- feat: added argument to set ai4privacy samples by @hanneshapke in #301
- fix(data): resolve character offsets for ai4privacy entity annotations by @hanneshapke in #302
- feat(data): add LLM-based dataset audit for noisy label detection by @hanneshapke in #303
- fix: flush stderr after training logs for real-time metaflow output by @hanneshapke in #304
- feat: add Dockerfile and API smoke tests for Linux release by @hanneshapke in #305
- fix: downgrade React to v18 and remove react-shepherd dependency by @Davidnet in #314
- feat: parse tokenizers version from go.mod and let all the flows and shell scripts use that version by @Davidnet in #313
- fix: update links URIs by @Davidnet in #315
- chore: merge frontend and tokenizer fixes ...
Kiji Privacy Proxy v0.4.9
Kiji Privacy Proxy v0.4.9
Downloads
- macOS: DMG installer (Apple Silicon and Intel) - Desktop app with UI
- Linux: Standalone binary archive (amd64) - API server only (no UI)
- Chrome Extension: Browser extension for PII detection in web forms
macOS Installation
Quick Start:
- Download
Kiji-Privacy-Proxy-0.4.9.dmg - Open the DMG and drag to Applications
- Launch "Kiji Privacy Proxy"
HTTPS Support - Install CA Certificate:
For HTTPS interception to work, you must trust the proxy's CA certificate:
# System-wide trust (recommended)
sudo security add-trusted-cert \
-d \
-r trustRoot \
-k /Library/Keychains/System.keychain \
~/.kiji-proxy/certs/ca.crtOr use Keychain Access:
- Open Keychain Access app
- File → Import Items →
~/.kiji-proxy/certs/ca.crt - Double-click "Kiji Privacy Proxy CA" certificate
- Expand Trust → Set to Always Trust
Linux Installation
Note: Linux build is API-only (no desktop UI). Access via HTTP endpoints.
Quick Start:
# Extract
tar -xzf kiji-privacy-proxy-0.4.9-linux-amd64.tar.gz
cd kiji-privacy-proxy-0.4.9-linux-amd64
# Run
./run.shHTTPS Support - Install CA Certificate:
# Ubuntu/Debian
sudo cp ~/.kiji-proxy/certs/ca.crt /usr/local/share/ca-certificates/kiji-proxy-ca.crt
sudo update-ca-certificates
# RHEL/CentOS/Fedora
sudo cp ~/.kiji-proxy/certs/ca.crt /etc/pki/ca-trust/source/anchors/kiji-proxy-ca.crt
sudo update-ca-trustConfiguration:
# Set API key
export OPENAI_API_KEY="your-key-here"
# Check health
curl http://localhost:8080/health
# Test proxy
curl -x http://localhost:8080 https://api.openai.com/v1/modelsSee included README.txt for systemd service setup and advanced configuration.
Chrome Extension
Install from zip:
- Download
kiji-pii-guard-0.4.9.zip - Unzip to a folder
- Open
chrome://extensions/ - Enable Developer mode
- Click Load unpacked and select the unzipped folder
Documentation
What's New
See the changelog below for details.
What's Changed
- Merge release jobs by @hanneshapke in #250
- chore: version packages by @hanneshapke in #251
Full Changelog: v0.4.8...v0.4.9
Kiji Privacy Proxy v0.4.8
Chrome Extension
- Chrome Extension:
kiji-pii-guard-0.4.8.zip
Install from zip:
- Download
kiji-pii-guard-0.4.8.zip - Unzip to a folder
- Open
chrome://extensions/ - Enable Developer mode
- Click Load unpacked and select the unzipped folder
What's Changed
- Release 20260223 v5 by @hanneshapke in #248
- chore: version packages by @hanneshapke in #249
Full Changelog: v0.4.7...v0.4.8