Security
Togii is built around privacy and safety by design. While the product is under development, these are the core security principles we follow.
Core principles
- User-controlled infrastructure: user data is designed to remain under user control.
- Data minimisation: collect the smallest amount of data needed for the task.
- Least privilege: restrict permissions and access paths.
- Auditability: actions should be traceable and reviewable.
Reporting a vulnerability
If you believe you’ve found a security issue, please email security@togii.ai with details. Please do not publicly disclose until we’ve had a chance to investigate.
Status
This page describes intentions and design principles. Formal security documentation (e.g., threat model, disclosure policy, SOC/ISO roadmaps) will be published as Togii matures.