How is Ovumcy different from typical period trackers?
Ovumcy is not limited to one cloud-only product shape. It combines a local-first app, a full self-hosted web deployment, and an optional self-hosted sync backend while avoiding telemetry and ad trackers by default and keeping exportability visible.
That product model is different from both cloud-first trackers and device-only apps because Ovumcy keeps multiple truthful operating modes instead of forcing one vendor-hosted default.
That matters for people who want exportability, infrastructure control, or a privacy stance they can inspect before trusting the product with sensitive health data.
Where is data stored in app, self-hosted web, and self-hosted sync?
The answer depends on the path. App-only keeps core health data on-device. Self-hosted web stores records in the server-side database you operate. Self-hosted sync is designed so the sync server stores ciphertext and sync metadata for the app rather than readable health records.
The app README describes the mobile path as local-first with on-device storage by default for core use.
The self-hosted web product uses SQLite under `/app/data` as the default baseline, with PostgreSQL available as an advanced operator path.
The self-hosted sync backend is designed to hold ciphertext, account and device metadata, blob-size metadata, and timestamps rather than plaintext health content or recovery phrases.
Does Ovumcy require a cloud account?
No. The local-first app does not require an account for core use, and the self-hosted web product does not require a vendor cloud account to install it, sign in, or keep it running. Managed hosting is a separate optional route, not a mandatory dependency.
Ovumcy can also expose optional OIDC sign-in when an operator wants SSO, but that remains a deployment choice rather than a mandatory vendor account dependency.
What can a self-hosted sync server read?
The self-hosted sync backend is designed to store ciphertext, account and device metadata, blob-size metadata, and timestamps, not plaintext cycle dates, symptoms, notes, recovery phrases, or client master keys.
This is the trust model documented by `ovumcy-sync-community`, which positions the server as encrypted sync transport rather than a plaintext health-data processor.
Operators still need to secure the host, TLS, backups, logs, and any secrets around the sync deployment, because zero-knowledge transport does not remove ordinary infrastructure responsibilities.