Your data never leaves your Mac.

Jensen Monitor is built with a zero-trust, zero-cloud architecture. Here's exactly how it works.

Architecture

No server. No attack surface.

💻

100% local application

No backend, no database, no cloud infrastructure.

👤

No user accounts

No passwords to steal. No credentials to leak.

🏗️

No server infrastructure

No servers means no server-side attack surface.

🛡️

Zero-trust by design

We can't access your data because we never receive it.

Most security breaches happen on servers. We eliminated the server.

API Key Storage

Keychain-level encryption.

  • Stored in macOS Keychain (AES-256-GCM)
  • Protected by your Mac's Secure Enclave
  • Never written to disk in plaintext
  • Never transmitted to Jensen Monitor servers (there are none)

Apple's Keychain is the same system that protects your passwords, certificates, and credit cards. Your API keys get the same treatment.

Network Security

Direct connections only.

  • All API calls use TLS 1.3
  • Direct connections to official provider APIs only
  • No proxy, no middleware, no man-in-the-middle

The app connects to exactly three domains:

api.anthropic.com api.openai.com generativelanguage.googleapis.com

App Sandbox entitlement:

com.apple.security.network.client

Outbound network only. No listening, no inbound connections.

Local Data

Everything stays on your machine.

  • Usage data stored in UserDefaults (app sandbox)
  • Subscription data stored in UserDefaults
  • No data export to cloud
  • Data deleted when app is uninstalled
Code Signing

Verified and notarized. Coming with v1.1

  • Apple Developer ID signed
  • Apple Notarized
  • Hardened Runtime enabled
  • No third-party frameworks or dependencies

Pure SwiftUI. No Electron. No JavaScript runtimes. No dependency supply chain to compromise.

Compliance

Why not SOC 2?

SOC 2 certifies that a company's servers protect your data. Jensen Monitor has no servers. Your data lives on your Mac, protected by Apple's security stack. There's nothing for us to certify — because there's nothing for us to access.

This is a feature, not a limitation.
Responsible Disclosure

Found something? Tell us.

If you discover a security vulnerability, please reach out. We take every report seriously.

contact@jensenmonitor.com