How We Keep Your Data Secure

Account & Session Security

Signup process:

Login process:

Every account also receives a deterministic pseudonym generated with an HMAC “pepper”, preventing exposure of real addresses if pseudonyms leak.

Encryption & Key Management

Access Control, Consent & Auditing

Input Sanitization & Content Safety

Operational Safeguards

Summary

Together, these layers provide:

All working in concert to keep user data confidential and resilient.