security

Last updated: February 2026


Latent Patterns is a small, deliberately simple service. We minimise our attack surface by minimising what we collect and what we run. This page describes how we protect your data and what you can expect from us.

1. infrastructure

Latent Patterns runs as a single Node.js process behind a reverse proxy (Caddy) that handles TLS termination. The server is hosted on dedicated infrastructure — not a shared hosting platform.

2. data storage

User data is stored in a local SQLite database running in WAL mode. The database is not exposed to the network — it is accessed only by the application process.

3. authentication

We use a passwordless magic link flow. There are no passwords to leak, brute-force, or reuse.

4. third-party services

We use a minimal set of third-party services:

We do not use third-party analytics, advertising networks, tracking pixels, CDNs for user-specific content, or any service that profiles our users.

5. data retention

6. application security

7. what we don't do

8. cookies

We use two essential cookies:

No tracking cookies, no third-party cookies.

9. reporting a vulnerability

If you discover a security vulnerability, please report it responsibly. Do not open a public issue.

Our security.txt is available at the standard well-known URI.

10. contact

For security questions or concerns: security@latentpatterns.com