Non-members reading private event details
SyncCircle's architecture centers row-level scoping so event visibility follows circle membership and invite state.
Security and Trust
Security is part of the product, not an afterthought. Row-level security, encrypted channels, and data minimization are built into every layer of SyncCircle.
SyncCircle's architecture centers row-level scoping so event visibility follows circle membership and invite state.
Secret or shadow-style visibility fails closed, with empty-state behavior instead of revealing that something exists.
Uploaded event media passes through EXIF stripping before it becomes viewable. No raw metadata is ever served.
Route and ride details are visible only to the participants and scoped circle members who need them.
AI orchestration uses minimized, purpose-bound inputs and keeps identifying detail out wherever possible.
Every database query runs through Supabase RLS policies. Circle membership, event visibility, and ride access are enforced at the database layer — not just the application layer.
Public forms, API endpoints, AI requests, broadcasts, and invite attempts are all rate-limited to prevent abuse and protect system resources.
Private circles, event invite links, and web RSVP routes are designed around explicit invite boundaries rather than public discoverability.
SyncCircle stores only the fields needed for coordination. PII is scrubbed before AI calls, and personal data is never used for advertising or model training.
Email delivery via Resend, SMS via Twilio, and push notifications all use authenticated, encrypted channels. No notification content is stored after delivery.
Authentication is handled by Supabase Auth with magic link and OAuth support. Session tokens are short-lived and server-validated on every request.
Get Early Access
Every layer designed to protect your coordination, not exploit it.
Less group chat. More real life.