Skip to main content

Documentation Index

Fetch the complete documentation index at: https://docs.toktra.dev/llms.txt

Use this file to discover all available pages before exploring further.

What Toktra captures

Toktra is a metadata-only monitoring platform. The agent and browser extensions never read, intercept, or store the content of any AI conversation — no prompts, no responses, no file attachments. The following fields are captured for every LLM request:
FieldExample
Token count (estimated, then reconciled)1,247 tokens
Provider hostnameapi.openai.com
Model identifiergpt-4o
Timestamp (UTC)2026-04-06T09:15:00Z
Application contextChrome, VS Code
Device identifierDevice certificate fingerprint
User attributionLinked to your identity provider
Request/response size (bytes)4,096 bytes
Estimated cost$0.03
Toktra never captures prompt content, response text, keystroke data, screen recordings, file contents, full URLs beyond the provider domain, or any non-LLM browsing activity.

How capture works

Toktra agents detect LLM provider traffic using Server Name Indication (SNI) inspection at the TLS handshake layer. SNI is a standard field in every TLS connection that announces the destination hostname — it is readable without decrypting the connection.
The agent reads the SNI hostname (e.g., api.openai.com) to confirm an LLM provider connection is occurring. The TLS session is never decrypted. Prompt and response content remain completely private end-to-end.
This approach applies to all platforms:
  • macOS — Swift Network Extension (NEFilterDataProvider) reads outbound SNI fields
  • Windows — WFP (Windows Filtering Platform) callout driver observes outbound connections (ALWAYS PERMIT — never blocks traffic)
  • Linux — eBPF socket probes trace outbound TCP connections on port 443
  • Browser extensions — Chrome, Edge, Firefox, and Safari extensions use the webRequest API to observe HTTP metadata to known LLM provider domains

Privacy Hours

Employees can configure a Privacy Hours schedule to pause all monitoring during personal time. During a privacy hours window, the agent collects no telemetry — nothing is captured, buffered, or transmitted.
Privacy Hours is designed for BYOD (Bring Your Own Device) scenarios where personal and work use may overlap. Your organization’s admin configures whether Privacy Hours is available on company-owned devices.
To configure Privacy Hours on macOS, click the Toktra icon in the system tray and select Preferences → Privacy Hours. You can set daily start and end times, specific days, or a custom schedule per day. The existence of a privacy hours gap is logged (as a period with no telemetry), but no data from within the window is ever collected.

Personal vs. business separation

If your organization enables Token Perks — a personal AI usage allowance — that personal usage flows through a completely separate data pipeline and is never visible to admins.
Token Perks personal usage flows through a completely separate data pipeline and is never visible to corporate analytics. Even Toktra platform admins can only access aggregate-level Token Perks reports — individual personal usage records are inaccessible to all admins.
Personal usage data is also encrypted with per-user keys using envelope encryption, with an org-level master key (KEK). This means that even at the storage layer, personal records are cryptographically isolated.

Data retention

Your organization controls how long individual-level telemetry is retained. You configure retention policies in the admin dashboard under Settings → Retention Policies. The default and configurable retention behavior:
Data typeDefault retentionBehavior after period
Individual usage telemetry90 daysAggregated and anonymized; no individual attribution
Aggregated team/org data2 yearsRetained (no individual attribution)
Device enrollment recordsDuration of enrollment + 30 daysAnonymized after decommissioning
Employee account recordsDuration of employment + 30 daysAnonymized
Audit logs7 years (WORM)Retained; required for compliance
Legal hold dataPer hold durationExempt from standard retention
Toktra enforces these policies automatically. You can adjust retention periods per organization via Settings → Retention Policies in the dashboard.

mTLS device authentication

All telemetry from Toktra agents is encrypted in transit using mutual TLS (mTLS). Both the device agent and Toktra’s cloud backend authenticate each other using X.509 certificates. Device certificates are issued by the Toktra Intermediate CA, stored in the device’s secure keychain, and are valid for 90 days. Each device has a unique certificate — if a device is decommissioned or an employee is offboarded, the certificate is revoked via OCSP and enrollment records are anonymized. This means:
  • All data in transit is encrypted (TLS 1.3)
  • Only enrolled, authenticated devices can submit telemetry
  • Compromised or decommissioned devices are immediately revocable

Data residency

You select your data residency region during onboarding or by contacting your Toktra account team. Your telemetry, analytics, and user data is stored only in your chosen region.

United States

us-east-1 (N. Virginia) — Default region

European Union

eu-west-1 (Ireland) — GDPR-compliant EU data storage

Australia

ap-southeast-2 (Sydney) — Australian data sovereignty

Canada

ca-central-1 (Canada) — Canadian data residency
You can view or update your organization’s data residency configuration via the API:
GET /v1/data-residency
Yes. Contact your Toktra account team or email support to initiate a data residency migration. Migrating between regions requires a planned maintenance window.
No personal or organizational data is transferred outside your chosen region for storage or processing. Sub-processors are configured to operate within your selected region. Standard Contractual Clauses (SCCs) are in place for any EEA-adjacent transfers. Contact legal@toktra.io for a copy of the Data Processing Agreement.
All data stores use AES-256 encryption at rest, managed by AWS KMS. Encryption keys are restricted to authorized Toktra services only.
Within Toktra, your data is isolated by access controls scoped to your organization ID. Toktra platform engineers require a documented business justification to access tenant data, and all such access is audit-logged.