Security
Last updated: February 2026
Security and privacy are core to how Moody is built. This page summarizes the technical and organisational measures in place to protect you.
Application Security
- The Moody app stores all notes and settings locally on your Mac. Nothing is uploaded to any server.
- No telemetry, analytics, or crash reporting is collected by the app.
- The app does not have any AI cloud integration. Voice processing and noise suppression run entirely on your device using an on-device ML model (RNNoise).
- Microphone audio is processed in real-time memory only and is never saved to disk or transmitted.
- The app is code-signed with Apple Developer ID and notarized by Apple for every release. macOS will verify the signature on first launch.
- Hardened Runtime is enabled, which restricts the ability of malicious code to tamper with the app's process.
- The only outbound network connection the app makes is to check for updates via the Sparkle framework, using HTTPS, to a server hosted in the EU (AWS S3, Stockholm, eu-north-1).
Website & Infrastructure Security
- The website is served over HTTPS.
- Update files and trial downloads are hosted on Amazon Web Services S3 (EU North, Stockholm) — data stays within the EU.
- Payment processing is handled by Payhip, which is PCI-DSS compliant. We never see or store credit card details.
- Trial sign-up emails are processed by Mailchimp (Intuit), which is GDPR-compliant and has Standard Contractual Clauses in place for EU-US data transfers.
- Website analytics (Google Analytics 4) and advertising measurement (Meta Pixel) are loaded only after explicit user consent via the cookie banner.
Permissions the App Requests
| Permission | Why it's needed |
|---|---|
| Microphone | Detects your voice to auto-scroll the prompter as you speak |
| Accessibility | Enables global keyboard shortcuts (e.g. Shift+Arrow) to work even when another window is focused |
Open Source Dependencies
- Sparkle (update framework) — MIT-compatible licence, source at github.com/sparkle-project/Sparkle
- RNNoise (noise suppression ML model) — BSD licence, source at github.com/xiph/rnnoise
Reporting a Security Issue
If you discover a security vulnerability in Moody, please contact: moody@mjarosz.com
We aim to acknowledge reports within 48 hours and resolve confirmed issues as quickly as possible.
Security Self-Assessment (CAIQ Lite)
The following answers address the most common questions from enterprise security questionnaires.
| Question | Answer |
|---|---|
| Do you have a documented information security policy? | Yes — reflected in our Privacy Policy, EULA, and this Security page |
| Do you encrypt data in transit? | Yes — all connections use HTTPS/TLS |
| Do you encrypt data at rest? | The app stores data locally on the user's device using macOS standard storage (UserDefaults, Keychain). The app itself encrypts nothing server-side because we hold no server-side app data. |
| Do you collect user data in the application? | No — the Moody app collects zero personal data |
| Do you use third-party analytics in the application? | No — the app has no analytics, telemetry, or crash reporting |
| Do you share or sell user data? | No — we do not sell personal data to any third party |
| Where is data stored? | User notes and settings: local device only. Trial emails: Mailchimp (USA, SCCs). Payments: Payhip (UK/EU). Update files: AWS S3 (EU North, Stockholm) |
| Do you have a breach notification procedure? | Yes — we will notify affected users and the relevant supervisory authority within 72 hours of becoming aware of a breach |
| Do you perform penetration testing? | As an individual developer of a local-only desktop application, we rely on Apple's notarization process, static code analysis, and dependency audits |
| Is the application sandboxed? | The app runs with macOS Hardened Runtime and is notarized by Apple. Full App Sandbox is not enabled because the notch overlay window and Sparkle update mechanism require broader system access; this is a technical constraint, not a security trade-off |
| Do you have a vulnerability disclosure policy? | Yes — contact moody@mjarosz.com. We aim to acknowledge within 48 hours |
| Do you use open source components? | Yes — Sparkle (MIT-compatible) and RNNoise (BSD). Both are auditable open-source projects |
| Do you have a DPA available? | Yes — see moody.mjarosz.com/dpa.html. Signed copies available on request |
| Do you comply with GDPR? | Yes — data controller identified, legal bases documented, data subject rights supported, EU-based infrastructure for app updates |
| What personal data does the application process? | None. The application is entirely local. |