Skip to main content

Security and Trust

The Architecture
of Trust.

Security is part of the product, not an afterthought. Row-level security, encrypted channels, and data minimization are built into every layer of SyncCircle.

Non-members reading private event details

SyncCircle's architecture centers row-level scoping so event visibility follows circle membership and invite state.

Hidden events leaking through counts or previews

Secret or shadow-style visibility fails closed, with empty-state behavior instead of revealing that something exists.

Photos exposing location metadata

Uploaded event media passes through EXIF stripping before it becomes viewable. No raw metadata is ever served.

Carpool or ride data leaking outside the right circle

Route and ride details are visible only to the participants and scoped circle members who need them.

AI pipelines receiving sensitive personal context

AI orchestration uses minimized, purpose-bound inputs and keeps identifying detail out wherever possible.

Row-Level Security

Every database query runs through Supabase RLS policies. Circle membership, event visibility, and ride access are enforced at the database layer — not just the application layer.

Rate Limits

Public forms, API endpoints, AI requests, broadcasts, and invite attempts are all rate-limited to prevent abuse and protect system resources.

Invite Scoping

Private circles, event invite links, and web RSVP routes are designed around explicit invite boundaries rather than public discoverability.

Data Minimization

SyncCircle stores only the fields needed for coordination. PII is scrubbed before AI calls, and personal data is never used for advertising or model training.

Multi-Channel Security

Email delivery via Resend, SMS via Twilio, and push notifications all use authenticated, encrypted channels. No notification content is stored after delivery.

Auth & Sessions

Authentication is handled by Supabase Auth with magic link and OAuth support. Session tokens are short-lived and server-validated on every request.

Get Early Access

Built on the
architecture of trust.

Every layer designed to protect your coordination, not exploit it.

Less group chat. More real life.