Security model

Security claims stay disciplined and tied to the product definition.

This page describes the security and operational safeguards implied by the current product specification. It does not claim third-party audits, certifications, or controls that are not documented in the repository.

Device identity and session control

TVs pair through QR or manual codes, reconnect as authenticated devices, and should keep a single active WebSocket connection per device. Short-lived access tokens and renewable sessions are part of the intended control model.

Real-time control channel

State sync, heartbeats, commands, template updates, and instant events are all defined around a structured WebSocket protocol with explicit message categories and acknowledgements.

Permissions and operational actions

The product definition requires explicit permissions for template publishing, playlist activation, branch and organization event dispatch, TV moves, resets, cache inspection, mini-shell usage, and reload actions.

Operational safeguards

Safe playlist switching, cache continuity, background update activation, rollback behavior, and fallback visual states are treated as reliability and safety requirements, not optional polish.

Responsible wording

What this page does not claim

  • No unsupported references to SOC 2, ISO 27001, or other formal certifications.
  • No invented penetration-testing cadence or response SLA.
  • No promise of controls that belong to deployment infrastructure but are not documented here.