Navigation map
Sitemap
Human-readable route map for buyers, auditors, and operators. The main trust path is home, case study, proof, services, and contact; the rest supports evaluation.
Core routes
Core review paths
Evidence dossiers
Writing posts
- /writing/what-to-show-buyers-during-sensitive-data-procurement
- /writing/sensitive-data-product-launch-checklist
- /writing/procurement-review-checklist-for-sensitive-apps
- /writing/pre-launch-privacy-audit-checklist-sensitive-data-apps
- /writing/mental-health-app-privacy-review
- /writing/how-to-prepare-for-buyer-privacy-review
- /writing/health-app-privacy-review-before-launch
- /writing/ai-health-app-privacy-audit
- /writing/what-founders-miss-before-launching-sensitive-data-products
- /writing/reduce-data-collection-risk-before-launch
- /writing/pre-launch-privacy-review-checklist-health-wellness-apps
- /writing/data-minimization-checklist-sensitive-apps
- /writing/proofvault-trust-case-v1-0-1
- /writing/protective-computing-doctrine
- /writing/paintracker-architecture
- /writing/the-overton-framework
- /writing/overton-doi
- /writing/privacy-first-pain-tracking
Artifact routes
- /artifacts/pain-tracker/architecture
- /artifacts/pain-tracker/ui-01-fastlog
- /artifacts/pain-tracker/ui-02
- /artifacts/security-and-audits/audit-pipeline
- /artifacts/security-and-audits/redacted-threat-model-excerpt
- /artifacts/security-and-audits/defensibility-packet-preview
- /artifacts/security-and-audits/sample-48-hour-teardown
- /artifacts/overton-framework/protective-computing-lifecycle
- /artifacts/overton-framework/local-authority-vs-cloud-dependence
- /artifacts/security-and-audits/threat-boundary-map
- /artifacts/security-and-audits/defensibility-packet-flow