Releases: dataiku/kiji-proxy
Kiji Privacy Proxy v0.4.11
Kiji Privacy Proxy v0.4.11
Downloads
- macOS: DMG installer (Apple Silicon and Intel) - Desktop app with UI
- Linux: Standalone binary archive (amd64) - API server only (no UI)
- Chrome Extension: Browser extension for PII detection in web forms
macOS Installation
Quick Start:
- Download
Kiji-Privacy-Proxy-0.4.11.dmg - Open the DMG and drag to Applications
- Launch "Kiji Privacy Proxy"
HTTPS Support - Install CA Certificate:
For HTTPS interception to work, you must trust the proxy's CA certificate:
# System-wide trust (recommended)
sudo security add-trusted-cert \
-d \
-r trustRoot \
-k /Library/Keychains/System.keychain \
~/.kiji-proxy/certs/ca.crtOr use Keychain Access:
- Open Keychain Access app
- File → Import Items →
~/.kiji-proxy/certs/ca.crt - Double-click "Kiji Privacy Proxy CA" certificate
- Expand Trust → Set to Always Trust
Linux Installation
Note: Linux build is API-only (no desktop UI). Access via HTTP endpoints.
Quick Start:
# Extract
tar -xzf kiji-privacy-proxy-0.4.11-linux-amd64.tar.gz
cd kiji-privacy-proxy-0.4.11-linux-amd64
# Run
./run.shHTTPS Support - Install CA Certificate:
# Ubuntu/Debian
sudo cp ~/.kiji-proxy/certs/ca.crt /usr/local/share/ca-certificates/kiji-proxy-ca.crt
sudo update-ca-certificates
# RHEL/CentOS/Fedora
sudo cp ~/.kiji-proxy/certs/ca.crt /etc/pki/ca-trust/source/anchors/kiji-proxy-ca.crt
sudo update-ca-trustConfiguration:
# Set API key
export OPENAI_API_KEY="your-key-here"
# Check health
curl http://localhost:8080/health
# Test proxy
curl -x http://localhost:8080 https://api.openai.com/v1/modelsSee included README.txt for systemd service setup and advanced configuration.
Chrome Extension
Install from zip:
- Download
kiji-pii-guard-0.4.11.zip - Unzip to a folder
- Open
chrome://extensions/ - Enable Developer mode
- Click Load unpacked and select the unzipped folder
Documentation
What's New
See the changelog below for details.
What's Changed
- fix: bump go version to use go.mod and mise tool version specified by @Davidnet in #318
- chore: version packages by @hanneshapke in #319
Full Changelog: v0.4.10...v0.4.11
Kiji Privacy Proxy v0.4.11
Kiji Privacy Proxy v0.4.11
Downloads
- macOS: DMG installer (Apple Silicon and Intel) - Desktop app with UI
- Linux: Standalone binary archive (amd64) - API server only (no UI)
- Chrome Extension: Browser extension for PII detection in web forms
macOS Installation
Quick Start:
- Download
Kiji-Privacy-Proxy-0.4.11.dmg - Open the DMG and drag to Applications
- Launch "Kiji Privacy Proxy"
HTTPS Support - Install CA Certificate:
For HTTPS interception to work, you must trust the proxy's CA certificate:
# System-wide trust (recommended)
sudo security add-trusted-cert \
-d \
-r trustRoot \
-k /Library/Keychains/System.keychain \
~/.kiji-proxy/certs/ca.crtOr use Keychain Access:
- Open Keychain Access app
- File → Import Items →
~/.kiji-proxy/certs/ca.crt - Double-click "Kiji Privacy Proxy CA" certificate
- Expand Trust → Set to Always Trust
Linux Installation
Note: Linux build is API-only (no desktop UI). Access via HTTP endpoints.
Quick Start:
# Extract
tar -xzf kiji-privacy-proxy-0.4.11-linux-amd64.tar.gz
cd kiji-privacy-proxy-0.4.11-linux-amd64
# Run
./run.shHTTPS Support - Install CA Certificate:
# Ubuntu/Debian
sudo cp ~/.kiji-proxy/certs/ca.crt /usr/local/share/ca-certificates/kiji-proxy-ca.crt
sudo update-ca-certificates
# RHEL/CentOS/Fedora
sudo cp ~/.kiji-proxy/certs/ca.crt /etc/pki/ca-trust/source/anchors/kiji-proxy-ca.crt
sudo update-ca-trustConfiguration:
# Set API key
export OPENAI_API_KEY="your-key-here"
# Check health
curl http://localhost:8080/health
# Test proxy
curl -x http://localhost:8080 https://api.openai.com/v1/modelsSee included README.txt for systemd service setup and advanced configuration.
Chrome Extension
Install from zip:
- Download
kiji-pii-guard-0.4.11.zip - Unzip to a folder
- Open
chrome://extensions/ - Enable Developer mode
- Click Load unpacked and select the unzipped folder
Documentation
What's New
See the changelog below for details.
What's Changed
- make confidence threshold configurable by @hanneshapke in #199
- store tour in config, block tour until t&c completed by @hanneshapke in #200
- Remove blank script, introduce spinner by @hanneshapke in #201
- Added open source notice by @hanneshapke in #203
- Frontend feedback by @hanneshapke in #202
- Update kiji images by @hanneshapke in #207
- update screenshot by @hanneshapke in #208
- Clean up 20260215 by @hanneshapke in #212
- added hf to docs by @hanneshapke in #213
- Updated Github actions, containers by @hanneshapke in #204
- deps(deps): bump @sentry/electron from 7.5.0 to 7.7.1 by @dependabot[bot] in #218
- deps(deps): bump lucide-react from 0.263.1 to 0.564.0 by @dependabot[bot] in #214
- deps(deps-dev): bump html-webpack-plugin from 5.6.5 to 5.6.6 by @dependabot[bot] in #216
- fixes count of PII in response by @hanneshapke in #209
- Create UI tabs for request/response by @hanneshapke in #210
- fix dmg build issue by @hanneshapke in #224
- deps(deps-dev): bump webpack-cli from 5.1.4 to 6.0.1 by @dependabot[bot] in #215
- deps-dev(deps-dev): bump the development-dependencies group across 1 directory with 17 updates by @dependabot[bot] in #229
- deps(deps): bump the go-dependencies group with 4 updates by @dependabot[bot] in #217
- deps(deps): bump lucide-react from 0.564.0 to 0.574.0 by @dependabot[bot] in #227
- deps(deps): bump react-shepherd from 6.1.9 to 7.0.0 by @dependabot[bot] in #226
- ci(deps): bump the github-actions group with 9 updates by @dependabot[bot] in #220
- Updated dataset and model by @hanneshapke in #211
- created changeset for new release by @hanneshapke in #231
- chore: version packages by @hanneshapke in #232
- new changeset for release by @hanneshapke in #233
- chore: version packages by @hanneshapke in #234
- Release 20260223 v3 by @hanneshapke in #235
- chore: version packages by @hanneshapke in #236
- New ONNX Link by @hanneshapke in #237
- chore: version packages by @hanneshapke in #238
- Release 20260223 v4 by @hanneshapke in #239
- chore: version packages by @hanneshapke in #240
- Release 20260223 v5 by @hanneshapke in #248
- chore: version packages by @hanneshapke in #249
- Merge release jobs by @hanneshapke in #250
- chore: version packages by @hanneshapke in #251
- deps(deps): bump modernc.org/sqlite from 1.46.0 to 1.46.1 in the go-dependencies group by @dependabot[bot] in #246
- deps(deps): bump @sentry/electron from 7.7.1 to 7.8.0 by @dependabot[bot] in #244
- deps(deps): bump @types/dompurify from 3.0.5 to 3.2.0 by @dependabot[bot] in #242
- deps(deps): bump react-shepherd from 7.0.0 to 7.0.3 by @dependabot[bot] in #243
- chore: add make pr command for AI-generated semantic PRs by @hanneshapke in #254
- ci: add semantic PR title enforcement workflow by @hanneshapke in #253
- docs: update README badge to point to combined release workflow by @hanneshapke in #255
- chore: combine dependency updates by @hanneshapke in #278
- fix(data): handle null entity_type in coreference clusters by @hanneshapke in #296
- chore: combine dependency updates by @hanneshapke in #299
- ci(deps): bump astral-sh/setup-uv from 7.5.0 to 8.0.0 by @hanneshapke in #298
- fix(data): shuffle samples before train/val split to prevent ordered-batch bias by @hanneshapke in #280
- feat(data): add AI4Privacy dataset import with label mapping by @hanneshapke in #287
- feat(model): remove coreference resolution task by @hanneshapke in #286
- feat(training): compute class weights from label frequency by @hanneshapke in #281
- feat(model): replace linear heads with deeper MLP classifiers by @hanneshapke in #282
- feat(model): support configurable base encoder for NER by @hanneshapke in #283
- feat(eval): switch to seqeval for entity-level F1 metrics by @hanneshapke in #284
- feat(model): add CRF layer for valid BIO sequence decoding by @hanneshapke in #285
- fix(tokenization): replace substring matching with character offsets from annotations by @hanneshapke in #277
- feat: improve model performance with deberta-v3-base, cosine scheduler, and layer-wise LR decay by @hanneshapke in #300
- feat: added argument to set ai4privacy samples by @hanneshapke in #301
- fix(data): resolve character offsets for ai4privacy entity annotations by @hanneshapke in #302
- feat(data): add LLM-based dataset audit for noisy label detection by @hanneshapke in #303
- fix: flush stderr after training logs for real-time metaflow output by @hanneshapke in #304
- feat: add Dockerfile and API smoke tests for Linux release by @hanneshapke in #305
- fix: downgrade React to v18 and remove react-shepherd dependency by @Davidnet in #314
- feat: parse tokenizers version from go.mod and let all the flows and shell scripts use that version by @Davidnet in #313
- fix: update links URIs by @Davidnet in #315
- chore: merge frontend and tokenizer fixes ...
Kiji Privacy Proxy v0.4.9
Kiji Privacy Proxy v0.4.9
Downloads
- macOS: DMG installer (Apple Silicon and Intel) - Desktop app with UI
- Linux: Standalone binary archive (amd64) - API server only (no UI)
- Chrome Extension: Browser extension for PII detection in web forms
macOS Installation
Quick Start:
- Download
Kiji-Privacy-Proxy-0.4.9.dmg - Open the DMG and drag to Applications
- Launch "Kiji Privacy Proxy"
HTTPS Support - Install CA Certificate:
For HTTPS interception to work, you must trust the proxy's CA certificate:
# System-wide trust (recommended)
sudo security add-trusted-cert \
-d \
-r trustRoot \
-k /Library/Keychains/System.keychain \
~/.kiji-proxy/certs/ca.crtOr use Keychain Access:
- Open Keychain Access app
- File → Import Items →
~/.kiji-proxy/certs/ca.crt - Double-click "Kiji Privacy Proxy CA" certificate
- Expand Trust → Set to Always Trust
Linux Installation
Note: Linux build is API-only (no desktop UI). Access via HTTP endpoints.
Quick Start:
# Extract
tar -xzf kiji-privacy-proxy-0.4.9-linux-amd64.tar.gz
cd kiji-privacy-proxy-0.4.9-linux-amd64
# Run
./run.shHTTPS Support - Install CA Certificate:
# Ubuntu/Debian
sudo cp ~/.kiji-proxy/certs/ca.crt /usr/local/share/ca-certificates/kiji-proxy-ca.crt
sudo update-ca-certificates
# RHEL/CentOS/Fedora
sudo cp ~/.kiji-proxy/certs/ca.crt /etc/pki/ca-trust/source/anchors/kiji-proxy-ca.crt
sudo update-ca-trustConfiguration:
# Set API key
export OPENAI_API_KEY="your-key-here"
# Check health
curl http://localhost:8080/health
# Test proxy
curl -x http://localhost:8080 https://api.openai.com/v1/modelsSee included README.txt for systemd service setup and advanced configuration.
Chrome Extension
Install from zip:
- Download
kiji-pii-guard-0.4.9.zip - Unzip to a folder
- Open
chrome://extensions/ - Enable Developer mode
- Click Load unpacked and select the unzipped folder
Documentation
What's New
See the changelog below for details.
What's Changed
- Merge release jobs by @hanneshapke in #250
- chore: version packages by @hanneshapke in #251
Full Changelog: v0.4.8...v0.4.9
Kiji Privacy Proxy v0.4.8
Chrome Extension
- Chrome Extension:
kiji-pii-guard-0.4.8.zip
Install from zip:
- Download
kiji-pii-guard-0.4.8.zip - Unzip to a folder
- Open
chrome://extensions/ - Enable Developer mode
- Click Load unpacked and select the unzipped folder
What's Changed
- Release 20260223 v5 by @hanneshapke in #248
- chore: version packages by @hanneshapke in #249
Full Changelog: v0.4.7...v0.4.8
Kiji Privacy Proxy v0.4.7
Chrome Extension
- Chrome Extension:
kiji-pii-guard-0.4.7.zip
Install from zip:
- Download
kiji-pii-guard-0.4.7.zip - Unzip to a folder
- Open
chrome://extensions/ - Enable Developer mode
- Click Load unpacked and select the unzipped folder
What's Changed
- Release 20260223 v4 by @hanneshapke in #239
- chore: version packages by @hanneshapke in #240
Full Changelog: v0.4.6...v0.4.7
Kiji Privacy Proxy v0.4.6
Chrome Extension
- Chrome Extension:
kiji-pii-guard-0.4.6.zip
Install from zip:
- Download
kiji-pii-guard-0.4.6.zip - Unzip to a folder
- Open
chrome://extensions/ - Enable Developer mode
- Click Load unpacked and select the unzipped folder
What's Changed
- New ONNX Link by @hanneshapke in #237
- chore: version packages by @hanneshapke in #238
Full Changelog: v0.4.5...v0.4.6
Kiji Privacy Proxy v0.4.5
Chrome Extension
- Chrome Extension:
kiji-pii-guard-0.4.5.zip
Install from zip:
- Download
kiji-pii-guard-0.4.5.zip - Unzip to a folder
- Open
chrome://extensions/ - Enable Developer mode
- Click Load unpacked and select the unzipped folder
What's Changed
- Release 20260223 v3 by @hanneshapke in #235
- chore: version packages by @hanneshapke in #236
Full Changelog: v0.4.4...v0.4.5
Kiji Privacy Proxy v0.4.4
Kiji Privacy Proxy v0.4.4
Downloads
- macOS: DMG installer (Apple Silicon and Intel) - Desktop app with UI
- Linux: Standalone binary archive (amd64) - API server only (no UI)
macOS Installation
Quick Start:
- Download
Kiji-Privacy-Proxy-0.4.4.dmg - Open the DMG and drag to Applications
- Launch "Kiji Privacy Proxy"
HTTPS Support - Install CA Certificate:
For HTTPS interception to work, you must trust the proxy's CA certificate:
# System-wide trust (recommended)
sudo security add-trusted-cert \
-d \
-r trustRoot \
-k /Library/Keychains/System.keychain \
~/.kiji-proxy/certs/ca.crtOr use Keychain Access:
- Open Keychain Access app
- File → Import Items →
~/.kiji-proxy/certs/ca.crt - Double-click "Kiji Privacy Proxy CA" certificate
- Expand Trust → Set to Always Trust
Linux Installation
Note: Linux build is API-only (no desktop UI). Access via HTTP endpoints.
Quick Start:
# Extract
tar -xzf kiji-privacy-proxy-0.4.4-linux-amd64.tar.gz
cd kiji-privacy-proxy-0.4.4-linux-amd64
# Run
./run.shHTTPS Support - Install CA Certificate:
# Ubuntu/Debian
sudo cp ~/.kiji-proxy/certs/ca.crt /usr/local/share/ca-certificates/kiji-proxy-ca.crt
sudo update-ca-certificates
# RHEL/CentOS/Fedora
sudo cp ~/.kiji-proxy/certs/ca.crt /etc/pki/ca-trust/source/anchors/kiji-proxy-ca.crt
sudo update-ca-trustConfiguration:
# Set API key
export OPENAI_API_KEY="your-key-here"
# Check health
curl http://localhost:8080/health
# Test proxy
curl -x http://localhost:8080 https://api.openai.com/v1/modelsSee included README.txt for systemd service setup and advanced configuration.
Documentation
What's New
See the changelog below for details.
Kiji Privacy Proxy v0.4.3
Kiji Privacy Proxy v0.4.3
Downloads
- macOS: DMG installer (Apple Silicon and Intel) - Desktop app with UI
- Linux: Standalone binary archive (amd64) - API server only (no UI)
macOS Installation
Quick Start:
- Download
Kiji-Privacy-Proxy-0.4.3.dmg - Open the DMG and drag to Applications
- Launch "Kiji Privacy Proxy"
HTTPS Support - Install CA Certificate:
For HTTPS interception to work, you must trust the proxy's CA certificate:
# System-wide trust (recommended)
sudo security add-trusted-cert \
-d \
-r trustRoot \
-k /Library/Keychains/System.keychain \
~/.kiji-proxy/certs/ca.crtOr use Keychain Access:
- Open Keychain Access app
- File → Import Items →
~/.kiji-proxy/certs/ca.crt - Double-click "Kiji Privacy Proxy CA" certificate
- Expand Trust → Set to Always Trust
Linux Installation
Note: Linux build is API-only (no desktop UI). Access via HTTP endpoints.
Quick Start:
# Extract
tar -xzf kiji-privacy-proxy-0.4.3-linux-amd64.tar.gz
cd kiji-privacy-proxy-0.4.3-linux-amd64
# Run
./run.shHTTPS Support - Install CA Certificate:
# Ubuntu/Debian
sudo cp ~/.kiji-proxy/certs/ca.crt /usr/local/share/ca-certificates/kiji-proxy-ca.crt
sudo update-ca-certificates
# RHEL/CentOS/Fedora
sudo cp ~/.kiji-proxy/certs/ca.crt /etc/pki/ca-trust/source/anchors/kiji-proxy-ca.crt
sudo update-ca-trustConfiguration:
# Set API key
export OPENAI_API_KEY="your-key-here"
# Check health
curl http://localhost:8080/health
# Test proxy
curl -x http://localhost:8080 https://api.openai.com/v1/modelsSee included README.txt for systemd service setup and advanced configuration.
Documentation
What's New
See the changelog below for details.
What's Changed
- make confidence threshold configurable by @hanneshapke in #199
- store tour in config, block tour until t&c completed by @hanneshapke in #200
- Remove blank script, introduce spinner by @hanneshapke in #201
- Added open source notice by @hanneshapke in #203
- Frontend feedback by @hanneshapke in #202
- Update kiji images by @hanneshapke in #207
- update screenshot by @hanneshapke in #208
- Clean up 20260215 by @hanneshapke in #212
- added hf to docs by @hanneshapke in #213
- Updated Github actions, containers by @hanneshapke in #204
- deps(deps): bump @sentry/electron from 7.5.0 to 7.7.1 by @dependabot[bot] in #218
- deps(deps): bump lucide-react from 0.263.1 to 0.564.0 by @dependabot[bot] in #214
- deps(deps-dev): bump html-webpack-plugin from 5.6.5 to 5.6.6 by @dependabot[bot] in #216
- fixes count of PII in response by @hanneshapke in #209
- Create UI tabs for request/response by @hanneshapke in #210
- fix dmg build issue by @hanneshapke in #224
- deps(deps-dev): bump webpack-cli from 5.1.4 to 6.0.1 by @dependabot[bot] in #215
- deps-dev(deps-dev): bump the development-dependencies group across 1 directory with 17 updates by @dependabot[bot] in #229
- deps(deps): bump the go-dependencies group with 4 updates by @dependabot[bot] in #217
- deps(deps): bump lucide-react from 0.564.0 to 0.574.0 by @dependabot[bot] in #227
- deps(deps): bump react-shepherd from 6.1.9 to 7.0.0 by @dependabot[bot] in #226
- ci(deps): bump the github-actions group with 9 updates by @dependabot[bot] in #220
- Updated dataset and model by @hanneshapke in #211
- created changeset for new release by @hanneshapke in #231
- chore: version packages by @hanneshapke in #232
New Contributors
- @dependabot[bot] made their first contribution in #218
Full Changelog: v0.4.2...main
v0.4.2
Kiji Privacy Proxy v0.4.2
Downloads
- macOS: DMG installer (Apple Silicon and Intel) - Desktop app with UI
- Linux: Standalone binary archive (amd64) - API server only (no UI)
macOS Installation
Quick Start:
- Download
Kiji-Privacy-Proxy-0.4.2.dmg - Open the DMG and drag to Applications
- Launch "Kiji Privacy Proxy"
HTTPS Support - Install CA Certificate:
For HTTPS interception to work, you must trust the proxy's CA certificate:
# System-wide trust (recommended)
sudo security add-trusted-cert \
-d \
-r trustRoot \
-k /Library/Keychains/System.keychain \
~/.kiji-proxy/certs/ca.crtOr use Keychain Access:
- Open Keychain Access app
- File → Import Items →
~/.kiji-proxy/certs/ca.crt - Double-click "Kiji Privacy Proxy CA" certificate
- Expand Trust → Set to Always Trust
Linux Installation
Note: Linux build is API-only (no desktop UI). Access via HTTP endpoints.
Quick Start:
# Extract
tar -xzf kiji-privacy-proxy-0.4.2-linux-amd64.tar.gz
cd kiji-privacy-proxy-0.4.2-linux-amd64
# Run
./run.shHTTPS Support - Install CA Certificate:
# Ubuntu/Debian
sudo cp ~/.kiji-proxy/certs/ca.crt /usr/local/share/ca-certificates/kiji-proxy-ca.crt
sudo update-ca-certificates
# RHEL/CentOS/Fedora
sudo cp ~/.kiji-proxy/certs/ca.crt /etc/pki/ca-trust/source/anchors/kiji-proxy-ca.crt
sudo update-ca-trustConfiguration:
# Set API key
export OPENAI_API_KEY="your-key-here"
# Check health
curl http://localhost:8080/health
# Test proxy
curl -x http://localhost:8080 https://api.openai.com/v1/modelsSee included README.txt for systemd service setup and advanced configuration.
Documentation
What's New
See the changelog below for details.
What's Changed
- more yaak replacements by @hanneshapke in #193
- removed unused files by @hanneshapke in #194
- Huggingface functionality by @hanneshapke in #195
- feat: Enhance LLM response parsing to support Mistral, Anthropic, Gemini by @Davidnet in #196
- release logging support for different providers by @Davidnet in #197
- chore: version packages by @hanneshapke in #198
Full Changelog: v0.4.1...v0.4.2