2 pointsby maniazi833 hours ago3 comments
  • maniazi833 hours ago
    One thing we intentionally avoided was long-term storage. Many file tools quietly retain inputs longer than users expect.

    Our default model is:

    Source deleted immediately after processing

    Converted output expires after 24h

    Logs retained up to 30 days (metadata only)

    No file contents stored in logs

    If anyone here runs file-processing infrastructure, I’d genuinely love to know — what retention window do you consider reasonable for this category?

  • maniazi833 hours ago
    Extra context: the goal was to be concrete (data lifecycle, retention, logs) rather than generic “we take security seriously” language. If there’s any security review question you’d expect answered on this page (sandboxing detail, threat model, key mgmt, etc.), tell me what’s missing and I’ll update it.
  • sfpi8313 hours ago
    [dead]