Security is our business. We practice what we preach.
All data is encrypted in transit using TLS 1.3 and at rest using AES-256 encryption.
Hosted on enterprise-grade cloud infrastructure with automatic security updates and monitoring.
We conduct regular security audits and penetration testing to identify and fix vulnerabilities.
24/7 monitoring with a documented incident response plan to quickly address any security issues.
We follow industry best practices and security standards:
We believe in being transparent about our security practices:
If you discover a security vulnerability, we encourage responsible disclosure. Please use the contact form below to report security issues and we will respond within 24 hours.
We appreciate the security research community and will acknowledge researchers who help us improve our security.
Have questions about our security practices? We're happy to discuss them.