← Back to Support
Privacy First: ChronoCast is designed with privacy as a core principle. Your media content and personal data remain under your direct control, whether streaming locally on your network or accessing externally through your own server.
🔒1. Overview and Scope
This Privacy Policy describes how ChronoCast handles information across its complete system, including the iOS/iPadOS client app and the required Mac Server companion app. ChronoCast enables media streaming from Mac servers to iOS devices, supporting both local network access and external access configurations.
What ChronoCast Is
ChronoCast is a two-component media streaming system consisting of:
- iOS/iPadOS Client App: Available on the App Store, provides the user interface for media discovery, browsing, and playback control
- Mac Server Companion App: Required server software that hosts your media library and provides streaming services
Core Privacy Principles
- User-Controlled Infrastructure: You own and operate the server that hosts your content
- No Third-Party Servers: We do not operate external servers or cloud services for media streaming
- Minimal Data Collection: Only essential technical data is collected for app functionality
- Local-First Design: Optimized for local network operation with external access as an optional configuration
🖥️2. System Architecture and Components
Mac Server App (Required Component)
The Mac Server App is an essential component that you install and operate on your own Mac computer. This server:
- Hosts and manages your media library
- Provides streaming services to iOS client apps
- Operates entirely under your control on your hardware
- Uses Bonjour/mDNS for automatic network discovery
- Handles media transcoding and streaming optimization
🏠 Your Infrastructure
The Mac Server runs on your hardware, in your location, under your complete control. We do not have access to your server or its content.
📱 iOS Client
The iOS app discovers and connects to your Mac Server, providing a native interface for media browsing and playback.
🔗 Direct Communication
Communication occurs directly between your iOS device and your Mac Server, with no intermediary services.
How Components Work Together
- Discovery: iOS app uses Bonjour/mDNS to find your Mac Server on the network
- Connection: Direct connection is established between iOS app and Mac Server
- Authentication: Optional password/security verification occurs directly with your server
- Streaming: Media content streams directly from your Mac to your iOS device
- Control: Playback commands are sent directly from iOS app to Mac Server
🌐3. Access Modes: Local vs External
ChronoCast supports two distinct access modes, each with different privacy and security implications:
| Aspect |
Local Network Access |
External Access |
| Configuration |
Default operation, no setup required |
Requires port forwarding/VPN setup |
| Network Scope |
Same Wi-Fi network only |
Internet access from anywhere |
| Data Path |
Direct within your private network |
Through your internet connection |
| Security |
Protected by your network security |
Requires additional security measures |
| Data Usage |
No internet data consumption |
Consumes your internet bandwidth |
| Performance |
Optimal speed and quality |
Limited by internet upload speed |
Local Network Access (Default Mode)
Recommended Configuration: Local network access provides optimal privacy, security, and performance for most users.
In local network mode:
- All communication stays within your private network
- No data traverses the internet for streaming
- Protected by your existing network security (WPA3/WPA2)
- Automatic discovery using Bonjour/mDNS
- Optimal streaming quality and minimal latency
External Access (Advanced Configuration)
Advanced Users Only: External access requires technical configuration and introduces additional security considerations.
External access enables streaming when away from home but requires:
- Router Configuration: Port forwarding to expose your Mac Server to the internet
- Security Setup: Strong passwords, encryption, and firewall configuration
- Dynamic DNS: Often needed for consistent access to changing IP addresses
- Bandwidth Consideration: Limited by your home internet upload speed
External Access Privacy Implications
When configured for external access:
- Your Mac Server becomes accessible from the internet
- Streaming data counts against your home internet data caps
- Security depends entirely on your configuration and maintenance
- We recommend using VPN solutions instead of direct port forwarding
📊4. Information Collection and Processing
Data Collected by iOS Client App
The iOS app collects minimal information necessary for functionality:
Local Storage (On Your Device)
- Server Connection History: Recently connected Mac Servers for quick access
- User Preferences: Playback settings, interface preferences, volume levels
- Playback State: Current position in media files, playback queue
- Discovery Cache: Temporary cache of discovered servers and media metadata
Network Discovery Data
- Server Information: Mac Server names, IP addresses, and service ports on your network
- Media Metadata: File names, durations, format information for display
- Connection Status: Success/failure of connection attempts for troubleshooting
Data Processing by Mac Server App
Your Mac Server processes information entirely on your hardware:
- Media Library Indexing: Scans and catalogs your media files locally
- Streaming Optimization: Transcodes media as needed for iOS compatibility
- Connection Management: Tracks active connections and streaming sessions
- Access Logs: Optional logging of connection attempts and streaming activity
Data We DO NOT Collect
Important: ChronoCast explicitly does not collect personal information, usage analytics, media content, or any data transmitted to external servers.
- Personal identification information
- Media content or file contents
- Usage analytics or behavioral tracking
- Location data beyond local network discovery
- Contact information or device contacts
- Advertising identifiers or tracking pixels
- Data transmitted to our servers (we don't operate any)
🔄5. How Information Is Used
All data collected by ChronoCast is used exclusively for app functionality and remains within your control:
iOS Client App Usage
- Server Discovery: Finding and connecting to your Mac Server on the network
- Media Browsing: Displaying your media library with metadata and artwork
- Playback Control: Managing streaming sessions and playback state
- User Experience: Remembering preferences and providing personalized interface
- Troubleshooting: Diagnosing connection issues and optimizing performance
Mac Server App Usage
- Media Management: Organizing and indexing your media library
- Stream Processing: Optimizing media for streaming to iOS devices
- Network Services: Broadcasting availability via Bonjour/mDNS
- Connection Handling: Managing simultaneous connections from multiple devices
- Security Enforcement: Authenticating connections and enforcing access controls
Data Sharing and Third Parties
Zero Third-Party Sharing: ChronoCast does not share any information with third parties. All data processing occurs locally on your devices.
Since ChronoCast operates entirely on your infrastructure:
- No data is transmitted to our servers (we don't operate any)
- No analytics or tracking services are used
- No advertising networks have access to your information
- No cloud services process your media or metadata
📈6. Data Consumption and Bandwidth Usage
Understanding how ChronoCast uses network resources is important for managing your internet usage and costs:
Local Network Streaming
No Internet Usage: Local network streaming does not consume internet bandwidth or count against data caps.
When streaming on your local network:
- Data flows directly between your Mac and iOS device via Wi-Fi/Ethernet
- No internet bandwidth is consumed for media streaming
- Unlimited streaming without data cap concerns
- Optimal quality based on your local network capacity
- Multiple simultaneous streams without internet impact
External Access Streaming
Internet Data Usage: External streaming consumes your home internet upload bandwidth and may count against data caps.
When streaming externally (via port forwarding or VPN):
Upload Bandwidth Consumption
- Audio Streaming: 128-320 kbps (typical music quality)
- SD Video: 1-3 Mbps upload required
- HD Video (720p): 3-5 Mbps upload required
- Full HD (1080p): 5-8 Mbps upload required
- 4K Video: 15-25+ Mbps upload required
Data Cap Implications
External streaming counts against your home internet data caps:
- 1 hour of HD video ≈ 2-4 GB of upload data
- 1 hour of audio ≈ 50-150 MB of upload data
- Multiple external connections multiply data usage
- Consider unlimited data plans for heavy external streaming
iOS Device Data Usage
On your iOS device:
- Local Streaming: Uses Wi-Fi, no cellular data consumed
- External Streaming: Uses Wi-Fi or cellular data based on your connection
- Metadata Sync: Minimal data for media library browsing (typically <1 MB)
- Discovery Traffic: Negligible Bonjour/mDNS broadcast traffic
Optimizing Data Usage
To minimize data consumption:
- Use local network streaming whenever possible
- Consider VPN solutions instead of direct external access
- Monitor upload bandwidth usage on your home connection
- Use lower quality settings for external streaming over cellular
- Download content for offline viewing when available
🛡️7. Security Measures and Considerations
ChronoCast implements multiple layers of security, with different considerations for local and external access:
Local Network Security
Inherent Security: Local network operation provides natural security boundaries and isolation.
Network-Level Protection
- Network Isolation: Traffic confined to your private network
- Wi-Fi Security: Protected by your WPA3/WPA2 network encryption
- Router Protection: Your router's firewall blocks external access by default
- Physical Security: Requires physical presence in your network location
Application Security
- iOS Sandboxing: iOS security model isolates app data and network access
- macOS Security: Mac Server operates within macOS security framework
- Encrypted Connections: HTTPS/TLS encryption for client-server communication
- Authentication: Optional password protection for server access
External Access Security
Security Warning: External access exposes your Mac Server to the internet and requires careful security configuration.
Required Security Measures
If configuring external access, you must implement:
- Strong Authentication: Complex passwords and multi-factor authentication where possible
- Firewall Configuration: Strict firewall rules limiting access to essential ports only
- Regular Updates: Keep Mac Server app and macOS updated with security patches
- Access Monitoring: Regular review of connection logs and access attempts
- Network Segmentation: Isolate Mac Server from other network devices when possible
Recommended External Access Methods
Instead of direct port forwarding, consider:
- VPN Solutions: Use your router's VPN or dedicated VPN software
- Tailscale/WireGuard: Modern mesh VPN solutions for secure remote access
- SSH Tunneling: Secure tunneling for technically proficient users
- Cloud VPN Services: Professional VPN services with proper security
Data Protection Measures
- Local Storage: All data stored locally on your devices with iOS/macOS encryption
- In-Transit Encryption: TLS/HTTPS encryption for all network communication
- No Cloud Storage: No data stored on external servers or cloud services
- User-Controlled Backups: Use your own backup solutions (Time Machine, iCloud, etc.)
Security Best Practices
To maintain optimal security:
- Keep Software Updated: Regular updates for both iOS app and Mac Server
- Use Strong Network Security: WPA3 encryption and strong Wi-Fi passwords
- Monitor Access: Review connection logs and unusual activity
- Limit External Exposure: Only enable external access when necessary
- Regular Security Reviews: Periodic assessment of your security configuration
⚖️8. Your Privacy Rights and Control
ChronoCast's architecture gives you complete control over your data and privacy: