verified_user SOC 2 Type II Compliant

Security at our
Core

We use a Zero-Knowledge architecture, meaning we can never see your 2FA seeds. Your keys are encrypted on your device before they ever touch our servers.

lock

Zero-Knowledge Data Flow

devices
key

Your Device

Encryption happens here

lock
dns
encrypted

Our Servers

Only sees encrypted blobs

lock
smartphone
key

Teammate

Decryption happens here

Unencrypted Key
Encrypted Data

Compliant with Industry Standards

verified_user SOC 2 Type II
gpp_good GDPR Ready
health_and_safety HIPAA
lock_clock ISO 27001

Comprehensive Protection

Security isn't just a feature; it's the foundation of our entire stack.

enhanced_encryption

Encryption at Rest & Transit

All data is encrypted using AES-256-GCM locally on your device. We use PBKDF2 SHA-256 to derive keys from your master password. In transit, all communications are secured via TLS 1.3.

  • check Client-side encryption
  • check Unique salt per user
bug_report

Regular Penetration Testing

We engage independent top-tier security firms to perform quarterly penetration tests on our web application, API, and mobile apps.

  • check Quarterly 3rd-party audits
  • check Public Bug Bounty Program
domain

Infrastructure Security

Hosted on AWS with strict VPC isolation. We utilize WAFs, DDoS protection, and automated intrusion detection systems to safeguard availability.

  • check Multi-AZ Redundancy
  • check Immutable Infrastructure

Operational Security Controls

Beyond technology, we provide the controls you need for governance.

manage_accounts

Granular RBAC

Define read, write, and share permissions at the folder or item level. Limit access to specific teams.

history_edu

Tamper-Proof Audit Logs

Every decryption event, share, and edit is logged immutably. Export logs to your SIEM.

key_off

Kill Switch

Instantly revoke access for compromised devices or departing employees with a single click.

Need a detailed security review?

Download our security whitepaper or schedule a call with our CISO.