Security principles

Separation

Isolated storage and infrastructure; no shared backend with Odyssi.

Least privilege

Tiered, role-based access with optional MFA policies.

Offline hardening

Locally sealed data, opportunistic sync, and tamper-evident logs.

Zero trackers

Minimal static footprint; no analytics, no external CDNs.