LogoOctoclip Docs

    Privacy & Security

    This page explains Octoclip's security boundaries across capture, storage, transfer, and display, plus practical controls you can enable.

    Data lifecycle

    StageDefault behaviorYour controls
    CaptureRecords clip content generated from copy actionsExclusion rules and source filtering
    StorageSaves history locallyRetention, capacity limits, manual cleanup
    TransferUses encrypted channels during syncEnable/disable sync, define scope
    DisplayShows content previews in historyRedaction and visibility controls

    Security baseline

    1

    Minimize capture scope

    Exclude sensitive apps and unnecessary sources.

    2

    Minimize sync scope

    Prefer metadata-only sync first, then expand only when required.

    3

    Clean sensitive data regularly

    Apply short retention for OTPs, key fragments, and secret-like content.

    DANGER

    Never expose credentials, keys, or tokens in public repositories, issue trackers, or screenshots.

    Risk scenarios

    Was this page helpful?