Security and trust

Security architecture is part of the product story, not just the engineering backlog.

Joinli’s public site summarizes the security posture we’re building toward so users understand what the product will protect and why that matters.

Non-members reading private event details

Joinli’s architecture centers row-level scoping so event visibility follows circle membership and invite state.

Hidden events leaking through counts or previews

Secret or shadow-style visibility is meant to fail closed, with empty-state behavior instead of revealing that something exists.

Photos exposing location metadata

Uploaded event media is intended to pass through EXIF stripping before it becomes viewable.

Carpool or ride data leaking outside the right circle

Route and ride details should be visible only to the participants and scoped circle members who need them.

AI pipelines receiving sensitive personal context

AI orchestration should use minimized, purpose-bound inputs and keep identifying detail out wherever possible.

Rate limits

Public website forms and previews are throttled to reduce abuse. The product roadmap also scopes limits for AI usage, broadcasts, photos, and invite attempts.

Invite scoping

Private circles, event invite links, web RSVP, and future browser routes are designed around explicit invite boundaries rather than public discoverability.

Data minimization

The website stores only the fields needed for waitlist, newsletter, and contact workflows. The product roadmap keeps the same minimization mindset.