Security

Security

Telethryve is powerful because it connects a phone conversation to a real computer, so the security posture is built around control and visibility.

Trust Signal

What people should know before they try Telethryve.

Security

Human-directed operation

Telethryve is designed for a person to start, steer, inspect, approve, and review work. Sensitive actions should remain visible to the user.

Security

Workstation-centered context

Files, tools, repositories, browsers, credentials, and local models remain part of the host workstation environment rather than being treated as generic cloud chat context.

Security

Local and air-gapped options

Telethryve's launch positioning includes local LLM, hybrid, and air-gapped workflows for cases where private context, offline operation, or stronger isolation matters.

Security

Account and credential handling

Do not put private keys, tokens, payment secrets, or customer credentials in public campaign materials or repository files. Keep them in the appropriate platform secret store, Keychain, or private operator runbook.

Security

Support channel

Report security concerns through [email protected] with enough detail to reproduce or understand the issue.

FAQ

Common questions.

FAQ

Does Telethryve require cloud AI?

No. Telethryve can use configured local, hybrid, hosted, web-plus-local, and air-gapped paths depending on the workflow.

FAQ

Is Telethryve fully autonomous?

No. The public posture is human-directed workstation work with visible progress, questions, approvals, and review.