Capture, OCR, transcription, embeddings, and chat all run locally.
Trust Centre
This page points at the artefacts security, privacy, and procurement reviewers normally ask for. If something here is missing or out of date, email hi@over.show or tell us on the contact page.
Deployment model
Overshow runs as a desktop application on each user's laptop. v1.0 is macOS 26 (Tahoe) on Apple Silicon. The app is code-signed and notarised.
- User data plane. Capture, OCR, transcription, search, and chat all run locally against a per-user SQLite database on the laptop. Nothing in that database leaves the device by default.
- Control plane. A small PostgreSQL schema on Neon holds account, billing, and device metadata only. It never stores captured content.
- Self-hosted option. Enterprise customers can pin specific model weights, disable the cloud model fallback, and point the optional MCP bridge at their own infrastructure.
- Offline. The desktop app works offline for capture, search, and chat against local models. Sign-in, billing, and device rotation need a connection to the control plane.
Security and architecture
- Security overview - concrete controls.
- Installation - what the app touches on the machine.
- System requirements - the hardware and OS envelope.
Review topics usually covered:
- Data boundary (captures on device, account in PostgreSQL)
- Encryption at rest (SQLCipher whole-database encryption, keychain-derived key)
- Capture scope controls (window, monitor, app, pause, exclusion categories)
- Operational health (code-signed, notarised, local health checks, no telemetry)
Privacy and policy
Review topics usually covered:
- Personal data categories and lawful basis
- Cookie usage (marketing site: none; web app: strictly necessary only)
- Cookieless analytics (Vercel Web Analytics and Speed Insights)
- Data retention and user rights
Data retention
Retention is set so nothing lingers longer than it needs to.
- Captured content (on device). Free plan: 7-day rolling window before older capture rows are purged locally. Pro: retained until the user deletes it or uninstalls. Users can wipe the local database at any time from the desktop app.
- Account and billing data (Neon). Retained while the account is active and for 12 months after deletion to honour statutory tax and accounting obligations. Then irrecoverably deleted.
- Auth events and security logs. 90 days, after which they are aggregated into non-identifying counters.
- Stripe payment records. Held by Stripe per their retention terms; we keep only the minimum metadata required to reconcile invoices.
- Backups. Point-in-time recovery on Neon for 7 days; no other backups hold user content.
Deletion requests to hi@over.show are actioned within 30 days, and the response confirms exactly what was removed and what statutory records remained.
Admin controls (Enterprise)
Admins get a read-only dashboard against the control plane plus the following levers:
- SSO and provisioning. Google OIDC, Microsoft Entra ID, and SCIM 2.0 for user lifecycle.
- Device policy. Enforce a single active device per user, require OS version minimums, and auto-revoke on new sign-in.
- Capture policy. Push organisation-wide app, window, and URL exclusions. Default exclusion categories for HR, finance, and password-manager apps.
- AI policy. Disable cloud model fallback, pin local model versions, and require explicit approval before any export.
- Audit. Export account and admin-action logs as JSON or CSV. No captured content ever appears in audit exports.
- Offboarding. One-click wipe the user's local database via a device command the next time the device is online.
Sub-processors
The full list of sub-processors that touch any production data:
- Neon - managed PostgreSQL for account, billing, and device metadata. EU region by default.
- Stripe - payment processing.
- Vercel - hosting for the marketing site and web app, plus cookieless Web Analytics and Speed Insights. No cookies are set and no cross-site identifiers are used.
Captured content (screens, audio, transcripts) stays on the laptop by default and no sub-processor touches it. It only leaves the device if you explicitly export it or opt in to a cloud integration, such as running the MCP server with --cloud.
Analytics and cookies
- Marketing site (over.show): no cookies. Vercel Web Analytics and Speed Insights run in cookieless mode and do not use cross-site identifiers. We collect aggregated page views, Web Vitals, and a small number of named conversion events (CTA clicks, pricing toggle, FAQ open/close, form start and submit outcomes). Form field values are never included in events.
- Web app (app.over.show): strictly necessary cookies only (session and anti-CSRF tokens). No advertising cookies, no cross-site tracking, no third-party analytics cookies.
- Desktop app: no telemetry. No analytics beacons are sent from the desktop app itself.
- Lawful basis: legitimate interests for cookieless analytics; strictly necessary for sign-in cookies. No consent banner is required because no non-essential information is stored on or retrieved from the device.
For the full disclosure, including each custom event and what it contains, see the privacy notice.
Commercial and legal
Review topics usually covered:
- Evaluation scope and success criteria
- Support responsibilities
- Contractual terms
Running a formal review
If you are coordinating a formal security or procurement review, email hi@over.show with:
- Your checklist or questionnaire.
- The stakeholders involved (security, IT, legal, commercial).
- Any blockers you need answered first.
We will map answers to each question and agree a walkthrough. First response within two working days.