Every single thing
DGR does for you

No jargon. No marketing speak. Just a plain explanation of every feature, what it does, and which plan includes it. If you have a question about what DGR actually does, this page answers it.

🟦 Sandbox — Free 🟣 AI Lab — $29/mo 🟢 Team — $79/mo ⬜ Business — $199/mo

Each plan includes everything from the tiers below it. Business includes everything.

🟦
Sandbox
Free forever — perfect for researchers and small teams sharing files with a trusted circle
$0
free forever
🔒
File Upload & Encryption
Storage
When you upload a file, DGR immediately encrypts it using AES-256-GCM — the same encryption standard used by banks. Nobody can read your file without going through DGR first. Your original file is never stored in plain text.
🔗
Public Share Links
Sharing
You get a shareable download link for each file. You set a maximum number of times it can be downloaded. Once that limit is hit, every additional download automatically receives a completely broken, unusable version of the file instead of the real one.
💀
Silent Corruption on Violation
Enforcement
If someone tries to download beyond the limit, or downloads from a second device, they get a file that looks real but is completely broken inside. AI models produce garbage outputs. PDFs show an access-denied message. Videos play corrupted frames. The person has no idea it happened — they just have a useless file.
🖐️
Device Fingerprinting
Identity
DGR silently identifies every device that downloads your file using a combination of browser characteristics — screen size, graphics card, audio system, installed fonts, and more. This fingerprint survives VPN changes and incognito mode. One device = one download slot.
⬇️
Owner Download (Mine Button)
Your Copy
You can always download your own original, unaltered file from your dashboard. This download does not count against your limit. You always get the clean, original version — your partners receive the watermarked versions.
Expiration Dates
Time Limits
Set a date and time after which a file can no longer be downloaded. After that date, the link stops working entirely. Useful for sending files that should only be accessible for a specific window of time, like a review period or an evaluation.
🔬
Differential Watermarking
Invisible Signature
Every download gets a unique invisible signature embedded directly into the file. For AI models, this means tiny modifications to the numbers inside the model weights — so small they don't affect performance at all. But these changes are specific to each download, so if the file ever leaks, the signature points back to exactly who received that copy.
🛡️
Collusion Resistance
Group Attack Defense
A watermark can be attacked by having multiple people average their copies together to cancel the signature. DGR's watermarking is engineered to resist this — even if up to ~32 people pool their copies, the signature can still be extracted and traced back to at least one of them.
🕯️
Canary Tokens
File Opens Alert You
Every file you distribute has an invisible tracker embedded inside it. The moment someone opens the file — on any device, anywhere in the world, even offline later — a silent signal is sent back to DGR. You receive an alert telling you who opened it, from what IP address, and when. This happens before any re-download or re-share.
🚦
Real-Time Risk Scoring
Every Download Evaluated
Every time someone tries to download your file, DGR checks their connection in real time. Are they using Tor to hide their identity? Are they in a country they weren't in an hour ago? Are they using an automated script instead of a browser? Each risk adds to a score (0–100). High scores automatically block or corrupt the download.
🌍
Impossible Travel Detection
Catches Shared Credentials
If your partner downloads from New York at 9am and then again from Tokyo at 10am, that's physically impossible. DGR detects this, flags it as a probable credential share or account compromise, and adds a large risk penalty. This catches partners who share their access link with colleagues.
🤖
Automation & Scraper Detection
No Bulk Downloads
DGR detects when someone is using a script or download tool (like curl, wget, or python) instead of a normal web browser. Automated tools get a high risk score, which typically means they receive a corrupted file. Real files only go to real people using real browsers.
🧅
Tor & VPN Detection
Anonymity Red Flag
Downloading through Tor (an anonymization network) adds the highest risk penalty. Downloads through VPNs or datacenter IP addresses also add risk. Someone downloading your sensitive file through Tor is almost certainly trying to hide their identity, which is a serious red flag.
📋
Access Logs
Who Downloaded What
A log of every download event for each file. Shows the time, device fingerprint, IP address, and whether the download was clean or corrupted. You can export this as a CSV file.
🗑️
File Deletion
Remove Anytime
Delete any file from your dashboard at any time. Once deleted, the download link stops working immediately. The encrypted file is removed from storage. Partners who still have the file can't re-download it.
🟣
AI Lab
Everything in Sandbox, plus forensic investigation, leak attribution, DMCA automation, and analytics
$29
per month
🟦 Includes everything in Sandbox (free tier) — all features above are included
🧪
Forensic Lab — Upload & Extract
Identify the Source
If you find your file somewhere it shouldn't be — on HuggingFace, GitHub, or a file sharing site — upload that copy to the Forensic Lab. DGR will extract the hidden watermark and tell you exactly which partner that file came from, what device they used, and when they downloaded it. It also shows you an investigation log of every step it took to reach that conclusion.
📊
Attribution Confidence Score
How Certain Is The Match
After forensic analysis, DGR gives you a confidence percentage (0–100%). 87% means there is very strong evidence this came from that specific partner. The score is based on whether the watermark signature is cryptographically valid, whether the partner ID matches a known download event, and whether behavioral patterns match.
📄
Evidence Report Export
Legal-Ready Proof
Export a signed JSON evidence package that includes: the original file checksum, every download event, canary fire timestamps, the watermark extraction proof, partner identity records, and the full chain of custody. This is designed to be submitted to lawyers and courts. The package is digitally signed so it can't be tampered with after export.
✉️
Secure Email Grants
One Person, One Download
Instead of a public link, you can send a personal download link to a specific email address. The recipient must verify their email with a one-time code before downloading. The link is then permanently locked to their device. If they try to use it on a different computer, they get a corrupted file. Nobody else can use their link.
🏢
Organization Management
Your Company Account
Create an organization profile for your company or lab. Add team members by email so multiple people at your company can manage files together. Assign admin or member roles. Organization setup is required before you can use partner sharing features. New members receive an email invite automatically.
📈
Analytics Dashboard
Full Download Overview
A visual dashboard showing all download activity across your files over the last 7, 30, or 90 days. See total clean downloads, how many were corrupted for violations, how many were blocked for suspicious behavior, and a chart of activity over time. Also shows your most active partners.
🗺️
Threat Intelligence Map
World Map of Activity
A world map that shows where all your download events are coming from. Green dots are clean downloads. Yellow dots are corrupted serves. Red dots are blocked threats. Hover over any country to see how many events came from there and what the risk breakdown was. Updates in real time as downloads happen.
🕵️
Partner Intelligence Scores
Risk Profile Per Partner
Every partner who has downloaded your files gets an automatic risk score based on their behavior. If they've had downloads blocked, switched devices unexpectedly, or shown unusual download patterns, their risk score goes up. You see a full profile for each partner: total downloads, devices used, blocked attempts, and a 0–100 risk score.
Live Event Feed
See It Happen In Real Time
While you have your dashboard open, a live notification feed appears in the bottom-right corner. Every download, canary fire, threat block, and corrupted serve shows up as a toast notification in real time — no page refresh needed. This uses a persistent connection to the DGR server.
🚨
Real-Time Email Security Alerts
Get Notified Instantly
When something security-relevant happens — a canary fires, a download gets blocked for suspicious behavior, or a leak is attributed — DGR sends you an email immediately. The email includes full details: who it was, what IP address, what the threat score was, and what action was taken.
⚖️
Leak Reports
Report a Leak
Found your file somewhere it shouldn't be? Submit the URL. DGR will automatically fetch the leaked file, run forensic watermark extraction to identify the source, and generate a complete investigation report. The attribution happens automatically in the background — you just paste the URL and wait.
📬
Automated DMCA Filing
Legal Takedown in One Click
Once a leak is identified, DGR generates a pre-filled DMCA takedown notice with all required legal information — the infringing URL, your ownership details, the forensic attribution, and the legal declaration. One click exports it as a text file ready to send. Works for HuggingFace, GitHub, Reddit, Telegram, and any other platform.
📍
Takedown Status Tracker
Follow the Process
Every DMCA notice you file gets tracked through a visual timeline: Reported → Attributed → DMCA Filed → Acknowledged → Removed. You always know what stage each takedown is at. Mark stages as complete as the platform responds. If the platform removes the content, mark it resolved.
💬
Slack Alerts
Notifications in Your Workspace
Connect DGR to your Slack workspace. Security alerts (canary fires, threat blocks, leak attributions) are sent directly to a channel you choose. Your whole team can see security events as they happen, right inside Slack, without logging into DGR.
🔔
Email Digest
Weekly Summary Report
Get a daily, weekly, or monthly email summary of all download activity, threat events, and partner usage. Send it to multiple people on your team. Useful for managers who don't want to log in every day but want a regular overview of what's happening with your protected files.
🔗
Webhooks
Connect to Your Own Systems
Register a URL at your own server. DGR will send a signed HTTP POST request to that URL every time a security event happens — a download, a canary fire, a threat block, a corrupted serve, etc. This lets you build your own automations: log events to your database, trigger alerts in PagerDuty, update a security dashboard, or anything else you can code.
🟢
Team
Everything in AI Lab, plus geo-fencing, honeypot traps, device allowlists, and shared workspaces
$79
per month
🟣 Includes everything in AI Lab ($29/mo) — all features above are included
🌐
Per-File Country Rules
Block or Allow Countries
For each file, you can set a list of countries that are blocked from downloading it (blocklist mode) or the only countries that are allowed to download it (allowlist mode). This is checked in real time on every download attempt using IP geolocation.
🚫
OFAC Sanctions Preset
Compliance Shortcut
One click applies a blocklist of all countries under US OFAC sanctions (Iran, North Korea, Syria, Cuba, Sudan). If your company is subject to export control regulations, this preset helps you stay compliant without manually selecting countries. Apply it to any file in seconds.
🇪🇺
Regional Presets
EU Only / US Only / Five Eyes
Instantly apply allowlist presets for common regions: EU only (all 27 EU member states), US only, or Five Eyes (US, UK, Canada, Australia, New Zealand). These are useful for compliance with data residency requirements or intelligence-sharing agreements. You can also customize from scratch.
🍯
Honeypot File Deployment
Fake Files That Alert You
Create a decoy file with a convincing name (like "GPT-5-weights-internal.pt" or "Q4-strategy-confidential.pdf") and place its access link somewhere only unauthorized people would look — a shared drive folder, a private Slack channel, an internal wiki. The file appears completely real. The moment anyone accesses it, you get an instant alert with their IP address and device fingerprint.
🎭
Honeypot File Types
Look Like Anything
Choose what type of file the honeypot appears to be: an AI model (.pt or .safetensors), a PDF document, a dataset (.csv or .jsonl), source code (.py or .ts), or a config/secrets file (.env or .yaml). The file's appearance matches the type you choose, making it convincing to whoever finds it.
🔥
Honeypot Fire Alerts
Instant Notification on Access
The moment anyone accesses a honeypot file, DGR fires an immediate security alert. You see the IP address, the full user agent string, the timestamp, and how many times the file has been accessed. Multiple fires from different IPs suggest the link was shared — a sign of a broader unauthorized access attempt.
📱
Device Allowlists
Specific Devices Only
For highly sensitive files, you can specify exactly which device fingerprints are allowed to download. Any attempt from a device not on the allowlist is rejected. This means even if someone has the correct access link, they can't download unless they're using a pre-approved device. Useful for regulated data distribution.
Partner Approval Queues
Review Before Anyone Downloads
Turn on approval mode for a file. Now, when you create an access link for a partner, it starts in "pending" status. The partner can click the link and see the file info, but they cannot download yet. You review their request in the Approvals section and either approve or deny it. Only then can they download.
👥
Partners View
All Partners, One Screen
A unified list of every partner who has ever received access to any of your files. See their email, which file they have access to, how many times they've downloaded, when they last accessed it, and their current status (active or revoked). Revoke any partner's access from this screen instantly.
🤝
Shared Team Workspaces
Your Whole Team in One Account
Multiple people at your company can log into the same DGR organization and manage files together. Upload access, partner grants, and analytics are shared across the whole team. Admins can see and manage everything. Members can manage their own files. Everyone works from the same shared library.
Business
Everything in Team, plus compliance exports, legal holds, audit logs, API automation, and approval workflows
$199
per month
🟢 Includes everything in Team ($79/mo) — all features above are included
📜
Immutable Audit Logs
Record of Everything
Every action taken in your DGR account is permanently logged: who uploaded a file, who granted access to a partner, who revoked access, every download event, every API call. Each log entry has a cryptographic signature so you can prove it hasn't been altered. Logs are retained for 90 days and can be exported at any time.
📋
Compliance Attestation Export
Proof of Compliance
Export a signed JSON document that proves your organization's complete file distribution history — every file, every partner, every download, every audit log entry. This is designed to be submitted to regulators, auditors, and legal teams to demonstrate that your file distribution practices meet compliance standards.
⚖️
Legal Hold Management
Protect Files During Litigation
Place any file under a legal hold. While a hold is active, the file cannot be deleted by anyone — not even account owners. This is required during litigation or regulatory investigation to ensure evidence is preserved. A log entry is created when a hold is placed and when it is released, with the name of who authorized each action.
🔑
API Keys
Use DGR Programmatically
Generate API keys (starting with dgr_) to access DGR from your own code. Automate file uploads, partner access grants, evidence exports, and more. Use this to integrate DGR into your internal tools, CI/CD pipelines, or model release workflows. The API key is shown once — copy it immediately.
🏗️
Full REST API Access
Build on Top of DGR
Every action available in the dashboard is also available via authenticated API calls. Upload files, create partner access links, pull analytics, export evidence packages, file leak reports, and manage compliance holds — all programmatically. Useful for teams that want to automate their model release pipeline.
🔐
SSO & Team Access Controls
Enterprise Identity (Roadmap)
Single Sign-On (SSO) via SAML allows your employees to log into DGR using your company's existing identity provider (Okta, Azure AD, Google Workspace, etc.). No separate passwords. When an employee leaves your company, their DGR access is automatically removed when their account is deactivated in your IdP.
📊
SIEM Integration
Pipe Events to Your Security Stack
Every security event DGR generates can be forwarded to your SIEM (Security Information and Event Management) system — Splunk, Datadog, Elastic, etc. — via a webhook. This means DGR activity shows up alongside all your other security telemetry in a single pane of glass.
✍️
Custom Usage Terms Per File
Make Partners Agree Before Downloading
Write custom terms of use for any file. Partners must read and accept these terms before they can download. Their acceptance is timestamped and logged permanently. This creates a documented, auditable record that the partner was explicitly informed of and agreed to the usage restrictions on your file.
💾
3 TB Storage
Large Model Support
3 terabytes of encrypted storage for your files. Individual files up to 150 GB each — large enough for the biggest AI model checkpoints. Up to 2,000 partner downloads per month across all your files combined. Up to 1,000 file uploads per month.

Side-by-Side Comparison

Every feature across every plan at a glance

Feature 🟦 Sandbox
Free
🟣 AI Lab
$29/mo
🟢 Team
$79/mo
⬜ Business
$199/mo
Storage & Limits
Storage100 GB750 GB1.5 TB3 TB
Max file size20 GB60 GB100 GB150 GB
Uploads per month51505001,000
Partner downloads / month252501,0002,000
File Protection
AES-256 encryption at rest
Public share links with copy limits
Silent corruption on violation
Device fingerprinting
Expiration dates
Owner (Mine) download
Device allowlists
Custom terms per file
Watermarking
Differential watermarking
Collusion resistance (~32 colluders)
Canary tokens (phone-home on open)
Threat Scoring
Real-time risk scoring (0–100)
Tor / VPN / datacenter detection
Impossible travel detection
Automation / scraper detection
Forensics & Attribution
Forensic Lab (upload & extract)
Attribution confidence score
Evidence report export (signed JSON)
Tamper-evident evidence chain
Analytics & Monitoring
Basic access logs
Analytics dashboard (charts)
Threat Intelligence Map
Partner Intelligence scores
Live real-time event feed
Real-time email security alerts
Geo-Fencing
Per-file country rules
OFAC sanctions preset
Regional presets (EU, US, Five Eyes)
Honeypots
Honeypot file deployment
Honeypot fire alerts
DMCA & Takedowns
Leak reports & attribution
Automated DMCA filing
Takedown status tracker
Integrations
Slack alerts
Email digest
Webhooks
API keys & full REST API
Compliance
Organization management
Partner approval queues
Immutable audit logs
Compliance attestation export
Legal hold management

Ready to protect your files?

Start with the free Sandbox plan. No credit card required. Upgrade any time as your needs grow.