Short answer
The security model reduces runtime network and script exposure, but it does not protect against a compromised browser, malicious extension, operating-system telemetry, or user-downloaded files after they leave the page.
Build boundary
Verification path
Use the verification page, browser DevTools, and repository privacy tests to inspect the behavior instead of relying on marketing language.
Why connect-src none matters
connect-src 'none' blocks fetch, XHR, WebSocket, EventSource, and sendBeacon destinations in supporting browsers after the page is loaded. It is a deployment control that supports the local-processing claim for the privacy build.
FAQ
Does CSP make the app risk-free?
No. CSP reduces classes of network and script exposure, but it is not a complete security boundary.
Why allow unsafe-inline styles?
The current pages include inline style attributes, so style-src 'unsafe-inline' remains a future hardening task.
Does the privacy build use third-party runtime scripts?
The generated artifact is audited so it does not intentionally load third-party runtime scripts.
Review note
Trust documentation reviewed: May 2026. These pages describe the current public and privacy-build architecture and should be updated when deployment, telemetry, or runtime dependencies change.