Security & Compliance

Hosting Isolation

How Geordy ensures complete isolation between customer domains

Each user domain operates within an isolated hosting environment on Geordy's infrastructure. This ensures that no data, configuration, or generated files are accessible across different accounts.

Hosting Design

Geordy's hosting architecture is built on the principle of complete isolation:

Unique Storage Paths

Every connected domain uses a unique, sandboxed storage path. Files are stored in isolated directories that cannot be accessed by other accounts.

Individual Subdomain Mounting

Subdomains (e.g., geo.example.com) are mounted individually and never share access with others. Each subdomain points to its own isolated file set.

Isolated Background Workers

Background workers regenerate files per domain, with no overlap in access credentials. Each worker operates within its assigned domain scope.

Verification

You can confirm hosting isolation by visiting your hosted subdomain directly:

Your Hosted Subdomain
https://geo.example.com/llms.txt

Only your files are available under that subdomain. Attempting to access another customer's subdomain will result in a 404 error or their own isolated file set.

1

Visit Your Subdomain

Navigate to your hosted subdomain (e.g., geo.example.com/llms.txt)
2

Verify File Access

Confirm that only your generated files are accessible

Complete Domain Isolation

Each domain operates in its own isolated environment

example.com
geo.example.com
Isolated Storage
shop.io
geo.shop.io
Isolated Storage
blog.net
geo.blog.net
Isolated Storage
Unique Paths
Sandboxed directories
No Cross-Access
Complete separation
Isolated Workers
Per-domain scope

Security Benefits

Hosting isolation provides multiple security advantages:

  • No cross-contamination – Files from one domain cannot affect another
  • Independent access control – Each domain has its own authentication scope
  • Isolated failure domains – Issues with one domain don't impact others
  • Compliance-ready – Meets requirements for data segregation
Next: Learn about Access & Permissions to understand user-level access controls.
Ask Geordy