Opsida
ProductsMethodContact
Speak with us
Back to Opsida

Security.

Our security position is straightforward: plant data should stay inside the plant unless a customer explicitly decides otherwise. This page explains the operational reality behind that principle and how to report a security issue.

Where inference runs

Yamazo Studio, WorkSense, and Yamazo Companion run inference on customer hardware. Models, weights, and application binaries are licensed and hardware-locked to specific machines. No video, annotation, or analysis result leaves the licensed device unless a user explicitly exports it. Althing is model-agnostic: it orchestrates whichever LLM you bring, whether that is a vendor subscription you control or a local model. Althing does not store or transmit prompts, responses, or tool outputs to anyone other than the model endpoint you configure. Opsida Airlock provides a dedicated security boundary between the plant network and external parties, with encryption at rest and in transit, hardware-locked access, and controlled DMZ sharing.

What we do not do

  • No telemetry.
  • No anonymised usage statistics.
  • No shadow cloud.
  • No model fine-tuning on customer data without a separate signed agreement.
  • No third-party SDKs in production builds.

Reporting a vulnerability

If you have found a security issue in any Opsida product or on this website, please email security@opsidatech.com. We will acknowledge receipt within two working days and aim to provide an initial assessment within seven. We do not operate a paid bug bounty programme yet, but we treat coordinated disclosure as a professional standard and credit reporters publicly in release notes with their permission.

Last updated: May 2026.
Opsida
ProductsMethodContact
Speak with us