Say what you mean. Without worry.

SafeSpeech re-encodes your messages — preserving meaning, changing phrasing — so that you can express yourself in words that are, provably, not yours.
You write
Type your message in the web app, Chrome extension, or any text field.
“Our company's pivot to subscription pricing is a mistake. We're going to lose the customers who got us here.”
The enclave re-encodes
Your message enters a sealed enclave. It preserves your meaning but changes every word. Three dials control how much it transforms.
The live text goes out
The re-encoded text — not your original words — is what reaches the recipient or gets posted.
¬ “This shift to recurring revenue models feels like we're abandoning our core base — the folks who built our foundation are going to walk away from this new structure.” [ss:85473405]
Attestation receipt
Every re-encoding generates a receipt: a cryptographic record of what dials were used, and whether the sender could have seen the output before sending.
Anyone can verify
Paste the [ss:XXXX] tag to see the receipt: what dials were used, whether randomness was injected, and whether the sender ever saw the output.

Three fun dials, like knobs on an electric guitar

Obfuscation

How much the wording diverges from the original

0 = near-verbatim · 10 = heavy

Wetness

Tolerance for imprecise paraphrasing

0 = precise · 10 = loose

Randomness

Non-deterministic variation — even the sender can't predict the output

0 = deterministic · 10 = wild

Calibrate to speaker and audience

Re-encoding isn't random paraphrasing. SafeSpeech uses context profiles — who you are, and who you're speaking to — to calibrate the transformation. A lawyer writing for a general audience gets different re-encoding than a developer messaging a colleague. The meaning is preserved relative to both sides of the conversation.

Sender context

“Tech policy writer, legal background, direct tone”

Audience context

“General Twitter/X audience, mixed technical literacy”

In one-on-one conversation, the recipient's own context profile overrides the default audience. The re-encoding adapts: it knows what both people will understand.

Noise as cover

When you know your words will be recorded exactly, you self-censor. You hedge, you flatten, you say less than you mean. The surveillance is quiet but the effect on language is enormous — people stop speaking freely not because they're told to, but because the cost of precision is too high.

SafeSpeech adds noise to the signal. This isn't a loss — it's cover. The recipient still gets your meaning, but the exact phrasing can't be scraped, quoted out of context, or pinned to you verbatim. You're free to say what you actually think because the words that travel the wire aren't yours.

This is an old move. When the electric guitar arrived, feedback was a problem — until musicians realized it was the thing that let them really play. The noise became inseparable from the expression. Every major shift in communication technology has produced its own version of this: the grain in the voice, the static on the line, the blur in the print. What looks like interference is often what makes honest communication possible.

SafeSpeech makes the noise deliberate, controllable, and verifiable. You set the dials. The attestation receipt proves how much was added. The meaning gets through. The exact words don't.

Two modes

¬ Encode & copy

You see the live text

The Chrome extension re-encodes your text and copies it to your clipboard. You paste and send it yourself.

The attestation receipt notes: sender could have seen the output before sending.

Works in any text field on any website.

¬→ Enclave post

You never see the live text

The enclave re-encodes and posts directly (to X, SafeSpeech, etc). You see the result only after it's live.

The attestation receipt notes: sender could NOT have seen the output before sending.

Strongest guarantee — no opportunity to cherry-pick.

Why should you believe the receipt?

Today: Receipts are signed by the SafeSpeech server. You're trusting that SafeSpeech operated the enclave honestly.

Soon: The enclave runs inside an AWS Nitro Enclave — a sealed, auditable compute environment. AWS cryptographically attests that the enclave is running specific open-source code. The receipt is signed by a key that only exists inside the enclave. Nobody — not even SafeSpeech — can tamper with the output.

The trust chain becomes: you trust AWS (that the hardware is sealed) + you can read the code (it's open source) = you know the receipt is real.