Security

Security at FileHolster

FileHolster is built offline-first. No network calls, no cloud sync, no telemetry. Your data never leaves your machine, and that is the strongest security posture an application can have.

Effective date: April 11, 2026

1. Our Approach

We believe the most secure application is one that never touches a network. FileHolster was designed from the ground up with a security-by-design philosophy: minimize the attack surface by eliminating unnecessary connectivity entirely.

Where most desktop applications phone home for analytics, sync data to the cloud, or require account authentication, FileHolster does none of these things. The result is a tool with an exceptionally small attack surface and zero exposure to network-based threats.

2. Application Security

FileHolster is built with Tauri v2, a modern framework that pairs a Rust backend with a lightweight web frontend. This architecture provides several security advantages:

3. Data Storage

All data stays on your machine. FileHolster stores your folders, notes, tasks, and configuration locally in your user profile directory. Nothing is transmitted, uploaded, or synced to any server, ever.

You have full control over your data at all times. Your files are stored in standard formats in directories you choose. If you uninstall FileHolster, you can delete the application data folder and every trace of it is gone.

We have no servers that receive, process, or store your data. We cannot access your files, notes, or any content you create in the application because we never see it.

4. Payment Security

Purchases are processed entirely by Stripe, which is certified as a PCI DSS Level 1 service provider - the most stringent level of certification available in the payments industry.

At no point does payment information pass through our infrastructure.

5. Website Security

The FileHolster website (fileholster.com) is hosted on Firebase Hosting by Google, which provides:

6. No Telemetry. No Tracking.

FileHolster makes zero network requests. There is no telemetry, no analytics, no crash reporting, no update checks, and no phone-home behavior of any kind. The application is completely silent on the network.

You can verify this yourself using any network monitoring tool (such as Wireshark or Windows Resource Monitor). You will see that FileHolster generates no network traffic whatsoever. This is not a setting you can toggle - it is a fundamental architectural decision. There is simply no networking code in the application.

7. Vulnerability Reporting

If you discover a security vulnerability in FileHolster or on our website, we want to hear about it. Please report it responsibly by emailing:

admin@inceptionforge.com

When reporting, please include:

We take every report seriously and will respond as quickly as possible. We ask that you allow us a reasonable timeframe to investigate and address the issue before any public disclosure.

8. Third-Party Dependencies

FileHolster is built on well-established open-source foundations:

We regularly review and update our dependencies to ensure known vulnerabilities are addressed promptly. Because the application has no network surface, the practical risk from dependency vulnerabilities is significantly reduced compared to networked applications.