Veiled Origin

Security & Data Handling

Your tag data never leaves your machine.

No cloud. No telemetry. No account. Built for industrial environments where data can't leave the network — and shouldn't anyway.

01 · Processing

Local-only, by design

All tag capture, storage, and export runs in your browser (chrome.storage.local) and your local Excel installation. Nothing ever hits a remote server.

02 · Telemetry

Zero telemetry

No analytics libraries. No crash reporting. No feature-usage counters. No phone-home on install, launch, or exit. We don't know you use the product — by design.

03 · Accounts

No account required

The browser extension installs anonymously. The Excel add-in activates with a license file (email or USB delivery) — no online activation, no server round-trip.

04 · Airgapped

Airgapped compatible

Works fully offline once installed. License delivery via email attachment or physical media. Custom redistributable builds available for fully-isolated networks.

05 · Data retention

You control retention

Captured data persists in local browser storage until you clear it (explicit "Clear" button), switch profiles, uninstall, or clear browser data. We have no way to retain it even if we wanted to.

06 · Dependencies

No third-party runtime calls

The product code does not load any third-party scripts at runtime. The marketing website loads Google Fonts, but that's only when you're on veiledorigin.com — the shipping products don't touch the internet.

For enterprise

Built for oil & gas, utilities, and regulated industries.

We built this for the environments we used to work in — where data governance is regulatory, not optional.

What we offer enterprise buyers

  • Single-source PO and quarterly invoicing accepted
  • Site licenses for unlimited seats within a facility
  • License file delivery via email or USB (no online activation)
  • Custom redistributable builds for fully-airgapped networks
  • Source-code escrow available for high-value contracts (quote required)
  • Security review documentation on request
  • Contact: [email protected]

Technical details

What runs where

Need a security review?

Happy to provide documentation, answer procurement questionnaires, or walk through our data-handling practices with your infosec team.

Request security docs Privacy policy