Security

Security is the product.

We build as if every user's data is our own because security failures erase trust faster than any feature can win it back.

End-to-end encryption

All data in transit and at rest is encrypted with AES-256 and TLS1.3.

Zero-trust by default

Least-privilege access, short-lived tokens, and hardware-backed keys.

Continuous monitoring

24/7 SIEM coverage with automated anomaly detection and alerting.

Hardened infrastructure

Isolated environments, automated patching, and daily configuration audits.

Independent audits

Annual SOC 2 Type II and ISO 27001 audits by accredited third parties.

Incident response

A documented IR plan with 24-hour disclosure commitments for customers.

Responsible Disclosure

Found a vulnerability? We'd like to hear from you.

We operate a coordinated disclosure program. Report issues to our security team and we'll acknowledge within 24 hours, triage within 72, and credit you in our Hall of Fame once resolved.

PGP: 0xA1B2 C3D4 E5F6 7890