SOC 2 CertifiedGDPR CompliantISO 27001WCAG AAA
24/7 Enterprise SupportLog In

Security & Privacy Documentation

Complete technical documentation of our security architecture, compliance certifications, and privacy guarantees.

Zero-Knowledge Architecture

Overview

Our zero-knowledge architecture ensures that we never have access to your unencrypted data or encryption keys. All cryptographic operations occur client-side, and we can only see encrypted data that is meaningless without the keys you control.

Technical Implementation

  • β–Έ
    Client-Side Encryption:

    All encryption happens in the browser using the Web Crypto API. The plaintext never leaves your device unencrypted.

  • β–Έ
    SRP-6a Authentication:

    Secure Remote Password protocol ensures passwords are never transmitted to our servers, even during authentication.

  • β–Έ
    Key Derivation:

    PBKDF2 with 100,000+ iterations derives encryption keys from your master password, with a unique salt per user.

Security Guarantee

Even if our servers were compromised, your data would remain secure because we never possess the keys needed to decrypt it. This is a mathematical guarantee, not just a policy.

End-to-End Encryption Specifications

Symmetric Encryption

AlgorithmAES-256-GCM
Key Size256 bits
IV Size96 bits
Tag Size128 bits

Asymmetric Encryption

AlgorithmRSA-OAEP
Key Size4096 bits
HashSHA-256
PaddingOAEP

Additional Security Layers

  • βœ“TLS 1.3: All data in transit is protected with TLS 1.3
  • βœ“Perfect Forward Secrecy: Ephemeral keys ensure past sessions remain secure
  • βœ“HSTS: HTTP Strict Transport Security prevents downgrade attacks
  • βœ“Certificate Pinning: Mobile apps verify server certificates

Compliance & Certifications

Regulatory Compliance

GDPR

European Union

Fully Compliant

General Data Protection Regulation

  • βœ“Right to erasure (Article 17)
  • βœ“Data portability (Article 20)
  • βœ“Privacy by design (Article 25)
  • βœ“DPO appointed

Last Audit: Q3 2024

CCPA

California, USA

Compliant

California Consumer Privacy Act

  • βœ“Consumer data deletion rights
  • βœ“Opt-out mechanisms
  • βœ“Privacy policy compliance
  • βœ“Data sale prohibition

Last Audit: Q2 2024

HIPAA

United States

Compliant

Health Insurance Portability and Accountability Act

  • βœ“BAA available
  • βœ“PHI encryption (256-bit)
  • βœ“Access controls (RBAC)
  • βœ“Audit logging

Last Audit: Q3 2024

PIPEDA

Canada

Compliant

Personal Information Protection and Electronic Documents Act

  • βœ“Consent mechanisms
  • βœ“Purpose limitation
  • βœ“Data accuracy measures
  • βœ“Safeguard requirements

Last Audit: Q1 2024

LGPD

Brazil

Compliant

Lei Geral de ProteΓ§Γ£o de Dados

  • βœ“Legal basis for processing
  • βœ“Data subject rights
  • βœ“International transfers
  • βœ“Security measures

Last Audit: Q2 2024

APPI

Japan

Compliant

Act on Protection of Personal Information

  • βœ“Purpose of use notification
  • βœ“Consent requirements
  • βœ“Security control measures
  • βœ“Disclosure upon request

Last Audit: Q3 2024

Security Certifications & Audits

SOC 2 Type II

Certified

Service Organization Control 2

Auditor: Deloitte

  • β€’Security
  • β€’Availability
  • β€’Processing Integrity

Valid Until: Dec 2025

ISO 27001:2022

Certified

Information Security Management System

Auditor: BSI Group

  • β€’Risk management
  • β€’Asset control
  • β€’Access control

Valid Until: Mar 2026

ISO 27017:2015

Certified

Cloud Security Controls

Auditor: BSI Group

  • β€’Cloud services
  • β€’Shared responsibility
  • β€’Virtual environment

Valid Until: Mar 2026

ISO 27018:2019

Certified

PII Protection in Public Clouds

Auditor: BSI Group

  • β€’PII protection
  • β€’Transparency
  • β€’Consent

Valid Until: Mar 2026

PCI DSS v4.0

Level 1

Payment Card Industry Data Security Standard

Auditor: Trustwave

  • β€’Network security
  • β€’Cardholder data
  • β€’Vulnerability management

Valid Until: Jun 2025

CSA STAR Level 2

Certified

Cloud Security Alliance Security Trust Assurance and Risk

Auditor: EY

  • β€’Cloud controls
  • β€’CCM compliance
  • β€’Transparency

Valid Until: Sep 2025

Government Clearance & Security Frameworks

US Government Standards

FedRAMP Ready
In Progress

Federal Risk and Authorization Management Program

  • β€’ NIST 800-53 controls implemented
  • β€’ Continuous monitoring capabilities
  • β€’ 3PAO assessment scheduled Q1 2025
StateRAMP
Authorized

State and local government security standard

  • β€’ Moderate impact level authorized
  • β€’ Multi-state compact member
  • β€’ Annual security assessments
CJIS Compliant
Active

Criminal Justice Information Services

  • β€’ FBI background checks completed
  • β€’ Security awareness training
  • β€’ Advanced authentication required

International Government Standards

UK G-Cloud 13
Listed

UK Government Cloud framework

  • β€’ Crown Commercial Service approved
  • β€’ OFFICIAL classification supported
  • β€’ UK data residency available
IRAP Assessed
Protected

Australian Government Information Security

  • β€’ PROTECTED level certified
  • β€’ ISM controls implemented
  • β€’ ASD Cyber Security Centre assessed
C5 (Germany)
In Progress

Cloud Computing Compliance Criteria Catalogue

  • β€’ BSI baseline protection
  • β€’ German data sovereignty
  • β€’ Audit Q2 2025
Personnel Security Clearance Support

US Clearances

  • β€’ Secret clearance capable
  • β€’ Public Trust positions
  • β€’ CAC/PIV authentication

Background Checks

  • β€’ FBI fingerprinting
  • β€’ NACI investigations
  • β€’ Continuous vetting

Facility Security

  • β€’ SCIF-compliant options
  • β€’ Secure compartmented info
  • β€’ Physical access controls

Data Residency & Sovereignty Options

🌎North America

United States

Cities: Virginia, Oregon, Ohio, California

FedRAMP boundaryITAR compliant

Canada

Cities: Montreal, Toronto

PIPEDA compliantData sovereignty

Mexico

Cities: QuerΓ©taro

LFPDPPP compliantLocal processing

🌍Europe

Germany

Cities: Frankfurt, Berlin

GDPR compliantSchrems II ready

Ireland

Cities: Dublin

EU data centerLow latency

France

Cities: Paris

SecNumCloudSovereign cloud

Switzerland

Cities: Zurich

Swiss privacy lawsNeutral hosting

🌏Asia Pacific

Singapore

Cities: Singapore

PDPA compliantAPAC hub

Japan

Cities: Tokyo, Osaka

APPI compliantLocal presence

Australia

Cities: Sydney, Melbourne

IRAP assessedData onshore

India

Cities: Mumbai, Delhi

Data localizationIT Act compliant
Data Residency Guarantees
  • βœ“ Data never leaves selected region without explicit consent
  • βœ“ Encryption keys stored in same jurisdiction
  • βœ“ Metadata and backups remain in-region
  • βœ“ Support staff access restricted by region
  • βœ“ Compliance with local data protection laws
  • βœ“ Regional disaster recovery options

Penetration Testing & Security Assessments

Latest Penetration Testing Results

External Network Penetration Test
Test Date:October 2024
Performed by:Rapid7
Methodology:OWASP, PTES
Critical Findings:0
High Findings:0
Medium Findings:2 (Resolved)
Low Findings:5 (Resolved)
Web Application Security Test
Test Date:September 2024
Performed by:CrowdStrike
Methodology:OWASP Top 10
Critical Findings:0
High Findings:0
Medium Findings:1 (Resolved)
Low Findings:8 (Resolved)
Red Team Exercise

Last: August 2024

  • β€’ Full kill-chain simulation
  • β€’ Social engineering included
  • β€’ 0 successful breaches
  • β€’ 14-day engagement
API Security Testing

Continuous with Burp Suite

  • β€’ Automated daily scans
  • β€’ Authentication testing
  • β€’ Rate limiting validation
  • β€’ Input fuzzing
Infrastructure Testing

Quarterly assessments

  • β€’ Cloud configuration review
  • β€’ Container security
  • β€’ Network segmentation
  • β€’ Privilege escalation tests
Security Testing Partners
πŸ›‘οΈ

Rapid7

Network Security

πŸ”

CrowdStrike

Application Security

🎯

Coalfire

Compliance Testing

πŸ”

NCC Group

Cryptography Review

Transparency Commitment: We conduct penetration testing quarterly and share high-level results with enterprise customers. Detailed reports available under NDA. Our bug bounty program has paid out over $500,000 to security researchers.

Audit Trails & Access Logs

Comprehensive Logging

Every access and action is logged with cryptographic integrity protection. Logs are immutable and tamper-evident.

Logged Events

  • β€’ Authentication attempts (success/failure)
  • β€’ Data access requests
  • β€’ Configuration changes
  • β€’ Administrative actions
  • β€’ API calls and responses
  • β€’ Security events and anomalies

Log Data Fields

  • β€’ Timestamp (UTC, millisecond precision)
  • β€’ User/Service identifier
  • β€’ IP address and geolocation
  • β€’ User agent and device fingerprint
  • β€’ Action performed
  • β€’ Result status and error codes

Log Integrity

Logs are protected with SHA-256 hash chains and stored in append-only storage. Any tampering is immediately detectable through hash verification.

Multi-Factor Authentication Options

Available Methods

  • πŸ“±
    TOTP Apps

    Google Authenticator, Authy, Microsoft Authenticator

  • πŸ”‘
    Hardware Keys

    YubiKey, Titan, any FIDO2/WebAuthn device

  • πŸ‘†
    Biometrics

    Touch ID, Face ID, Windows Hello

  • πŸ“§
    Email/SMS

    Time-limited codes with anti-phishing protection

Advanced Features

  • πŸ›‘οΈ
    Risk-Based Authentication

    Adaptive MFA based on login context and behavior

  • πŸ”’
    Backup Codes

    One-time use recovery codes stored securely

  • πŸ”„
    Device Trust

    Remember trusted devices for seamless access

  • ⚑
    Passwordless

    WebAuthn for password-free authentication

Air-Gapped Key Generation & Management

Air-Gap Security Model

Critical cryptographic keys are generated on systems that have never been connected to the internet, ensuring zero possibility of remote compromise during key generation.

Generation Process

  1. 1. Boot from verified read-only media
  2. 2. Generate keys using hardware RNG
  3. 3. Split keys using Shamir's Secret Sharing
  4. 4. Store in HSMs and cold storage
  5. 5. Destroy generation environment

Security Controls

  • β€’ Faraday cage during generation
  • β€’ Multi-party key ceremony
  • β€’ Video recording of process
  • β€’ Cryptographic attestation
  • β€’ Physical security controls

Hardware Security Modules

HSM TypeFIPS 140-2 Level 3 certified
Key StorageMaster keys never exist in plaintext outside HSM
Access ControlMulti-factor authentication with quorum
BackupM-of-N key shares in geographically distributed vaults
Request Security Audit Report