Skip to main contentSecurity and privacy
Data scope
Users explicitly choose sources and time ranges for ingestion.
Access controls
Source access is permissioned and revocable.
Privacy posture
Local data remains local by default in self-hosted mode. Escalations are logged and auditable.