Skip to content
Privacy proof

Verify it yourself.

We could promise you that Otterlog doesn't send your meetings anywhere. So could every other tool. Instead, here's the complete list of network calls Otterlog can make, in full detail, with instructions to confirm independently in under five minutes.

The complete list

Three calls. That's all.

No telemetry. No analytics. No crash reports. No content of any kind. The three lines below are every byte Otterlog will ever send from your computer.

otterlog.app · complete outbound traffic, annotated
Call Trigger Destination What's sent Why
License check First launch, then every 7 days api.lemonsqueezy.com License key, app version Confirms your purchase. Cached locally with a grace window so offline use is fine.
Update check App launch, once per 24h updates.otterlog.ai Current version, OS version Tells you when a new release is available. You decide whether to install.
Model download First run, on your click models.otterlog.ai Standard HTTPS GET One-time download of Whisper, pyannote, and Phi-3.5-mini weights. Cached locally; never re-fetched unless deleted.

That's the entire list. Audio? Stays on your machine. Transcripts? Stay on your machine. Summaries? Stay on your machine. We don't have a server that could receive them, even if we wanted to.

Reproduce it yourself

Five minutes. Two tools.

Trust nobody, including us. Install one of the network inspectors below and watch Otterlog's traffic in real time during a recording session.

Mac · Little Snitch

1. Install Little Snitch.

2. Open Little Snitch Network Monitor.

3. Launch Otterlog, start a recording, talk for a minute, stop.

4. Filter on process: otterlog.

5. Confirm: only the three destinations above. Nothing else.

Mac & Windows · Wireshark

1. Install Wireshark.

2. Start a capture on your active interface.

3. Run a full Otterlog session: record, transcribe, summarise.

4. Filter: tls.handshake.extensions_server_name contains "otterlog" or "lemonsqueezy"

5. Every Otterlog packet hits one of the three domains. Bytes-out for non-license traffic? Zero.

Source code transparency

Proprietary, but reproducible.

Otterlog isn't open source. That's an intentional commercial choice; Papi Labs needs to sell licenses to fund development. What you can verify independently:

  • Every network call the app makes, via the methods above.
  • Every third-party library Otterlog uses, listed at /licenses. None of them phone home either.
  • Code-signing chain on the Mac DMG and Windows EXE; both are signed and notarised by Papi Labs Ltd.
  • SHA-256 checksums for every release on the download page.

If you want to inspect the source itself for an enterprise or compliance use case, email hello@otterlog.ai. We're open to source escrow arrangements case-by-case.

Now you know. Want a copy?

Founding-member access opens soon. Drop your email below if you want to hear when slots open.

One email at launch. Nothing else.