Version 1.0 · Effective: 27 April 2026
| Service | display.dev — gated artifact publishing engine |
| Provider | Displaydev OÜ, Ankru 8-23, Tallinn, 11713, Estonia |
| Data location | EU (PostHog), US (Neon, Fly.io, Postmark, Stripe), global (Cloudflare R2 + KV) |
| Transfer mechanism | EU Standard Contractual Clauses (SCCs) for all non-EU sub-processors |
| Report a vulnerability | [email protected] |
| General security contact | [email protected] |
For the full list of sub-processors and the data each handles, see the Privacy Policy §5. For the contractual terms that govern processing of personal data on your behalf, see the Data Processing Agreement.
Artifacts on *.dsp.so are real HTML. Any JavaScript, styles, or embedded resources the publisher included reach the viewer's browser unchanged. Authentication controls who can view an artifact; it doesn't sandbox the artifact's scripts from viewers inside the same organisation. A publisher inside your organisation could write an artifact that exfiltrates its contents to an external endpoint — the same risk as any insider with read access to your company documents. It isn't specific to display.dev.
The view-token cookie is scoped to the exact host that issued it, so a script on acme.dsp.so can't replay cookies on beta.dsp.so. Every publish is attributed in the audit log, so any abuse traces back to an identified publisher. That doesn't eliminate the risk — preventing JavaScript would make the product useless for the reports, dashboards, and interactive explainers it exists to host.
For questions or to request a stricter publishing mode, email [email protected].
| Data | Primary location | Transfer mechanism |
|---|---|---|
| Customer accounts, organisations, usage events, billing records, audit logs | Neon — United States | EU SCCs |
| Customer artifacts (HTML, Markdown) | Cloudflare R2 — global | EU SCCs |
| KV cache (short-lived view tokens, signed URLs) | Cloudflare KV — global | EU SCCs |
| Product analytics and session replay | PostHog — EU (eu.posthog.com) | No third-country transfer |
| Application runtime | Fly.io — Ashburn, VA (US) | EU SCCs |
| Transactional email | Postmark — United States | EU SCCs |
| Payment processing | Stripe — United States | EU SCCs |
In transit. All traffic to display.dev, dsp.so, and app.display.dev is served over TLS 1.2 or higher. HSTS is enabled on our own origins.
At rest. Customer data lives exclusively in managed services: Cloudflare R2 (artifacts), Neon Postgres (primary database), and Cloudflare KV (cache and short-lived tokens). Each vendor applies encryption at rest by default, as documented in their respective security pages. We run no self-managed persistent storage.
If we become aware of a security incident that affects Customer Content or personal data, we will:
Report a suspected incident to [email protected].
We welcome vulnerability reports. Send them to [email protected] with:
We respond to every vulnerability report. Confirmed high-severity issues are prioritised over everything else. We don't currently operate a paid bug bounty programme.
We do not hold a SOC 2 report today. As our customer base grows we will publish timelines for SOC 2 Type I and Type II. Customers with a formal security-review requirement can request a CAIQ or SIG questionnaire response from [email protected].
Displaydev OÜ Ankru 8-23, Tallinn, 11713, Estonia