Your Image Never Leaves Your Browser
The default cutout path runs entirely in your browser via ONNX Runtime and WebAssembly. There is no source-image upload to our servers on the happy path. The HD download you receive was computed by your own CPU. Free, no signup, no account.
Open the editorMost background removers — including the well-known incumbent — process every image on the vendor's servers. Your photo is uploaded, segmented in a vendor-controlled inference cluster, and downloaded back as a cutout. That round-trip is the right architecture for some use cases, but it makes the privacy story difficult: you are trusting the vendor's data-handling policy, log-retention practices, and breach posture every time you remove a background. remove-bg.io takes a different default. The cutout model loads once into your browser cache, the segmentation runs on your machine, and the result never traverses our network. This page documents exactly how that works, when the default path is bypassed, and what we explicitly don't do.
How the on-device path actually works
Three steps, all local to your browser, in the order they execute on first upload:
What we explicitly don't do
Privacy by negation — listing the things this page does not do, in plain English:
When the backend IS used (and why)
The on-device path is the default; it is not the only path. Two cases trigger the optional backend fallback at api.remove-bg.io:
On the suspect-fallback path the source image is uploaded, but the backend discards it after the response is returned. We do not log the source image, hash it, or aggregate it with other uploads.
GDPR, CCPA, and data-residency questions
The on-device default makes most of the standard data-protection questions trivial — there is nothing to share, store, or transfer cross-border for the cutout itself. The relevant facts:
Why on-device beats cloud for free-tool privacy
Almost every free background remover on the market today is a thin wrapper around a hosted segmentation API. The vendor uploads your image, runs an inference cluster, returns a result, and writes a per-request log entry. Even when the privacy policy promises the upload is discarded after processing, you are trusting that policy's enforcement — not verifying it. The on-device default removes the trust requirement entirely: the cutout never enters our network, so there is no policy to audit and no log entry to hope was deleted. ONNX Runtime + WebAssembly has been mature enough since mid-2022 to handle the U2-Net segmentation graph at interactive latency on a mid-range laptop. We picked the architecture deliberately in 2023 to make the privacy story unambiguous and externally verifiable rather than promise-based.
The cost of this architecture is borne by us, not by you: model hosting on Cloudflare R2, build complexity for the WASM bundle, the cold-start latency on first visit (roughly 600–900 ms median for the model fetch plus runtime warm-up), and the lack of a server-side telemetry stream we could otherwise use to optimize segmentation quality. The benefit is that you can hand this page to a privacy-conscious client, a compliance team reviewing tooling, or a journalist investigating why background-remover tools have become a vector for image-data leakage — and the answer is concrete and inspectable. Open DevTools, watch the Network tab during your next cutout, and confirm directly: no upload of the source image, only the model load and the standard analytics beacons that carry no source-image data whatsoever.
For sellers, freelancers, and creators who routinely handle sensitive client material — product prototypes under NDA, unreleased fashion looks, medical or dental photography, identification documents, draft brand assets, internal pitch decks, prerelease product shots — the on-device default is not a marketing line, it is a structural property of the build. The model cache key onnx-model-v1 lives in your browser's Cache API and can be inspected via Application → Cache Storage in DevTools. The WASM artifact at /onnx-runtime-web-bundle.wasm is the same binary that runs on your CPU. The schema markup on this page (`WebApplication` + `FAQPage` with citeable answers) exposes these implementation facts to AI Overviews, Bing Chat, ChatGPT Search, Claude, and Perplexity so they can cite the actual architecture — not just our marketing copy — when users ask about private background-removal tools. This is the structural inverse of the traditional cloud-bg-remover funnel: instead of trusting a vendor policy, you can trust the code path your browser is running.
When the cloud-API path is genuinely better
The on-device default is not always the right pick. Three honest cases where a hosted-API tool would serve you better:
If none of those three apply, the on-device default is genuinely the simplest privacy story available in this category. See /vs/remove-bg/ for the side-by-side.
Related pages on this site
Three follow-up pages that go deeper on adjacent questions:
Privacy FAQ
Open the editor — your image stays where it belongs
Free, no signup, no account. The default cutout path never leaves your browser.
Open the editorLast verified: