Enterprise Security. Complete Transparency.

Bank-grade security with open-source transparency.
Verify every line of code. Control every aspect of your data.

Certifications & Compliance

AGPL-3.0
Active

Open source license ensuring transparency

SOC 2 Type II
In Progress

Security and availability certification

GDPR
Compliant

European data protection compliance

CCPA
Compliant

California privacy law compliance

Technical Security

Military-grade encryption and security protocols

Encryption at Rest
AES-256 encryption for all stored data. Your documents are encrypted before being written to disk.
Encryption in Transit
TLS 1.3 for all network communication. Man-in-the-middle attacks are prevented by default.
Secure Key Management
Industry-standard key rotation and management. Keys are never stored with encrypted data.
Data Sovereignty
Self-host on your infrastructure for complete control. Your data never leaves your servers.
Immutable Audit Logs
Cryptographically verified logs of all access and modifications. Tamper-proof compliance.
Access Monitoring
Real-time alerts for suspicious access patterns. Know immediately when something is wrong.

Granular Access Control

Control exactly who can access your documents and when

Email Verification

Require email verification before viewing

Password Protection

Add password requirements to documents

Domain Restrictions

Limit access to specific email domains

IP Allowlisting

Restrict access to specific IP ranges

Time-Based Expiry

Automatically expire access after a set time

Download Limits

Control how many times a document can be downloaded

Infrastructure & Operations

Self-Hosting Security Benefits

• Complete control over your infrastructure

• Data never leaves your premises

• Meet regulatory requirements for data residency

• Audit source code for security verification

• No third-party access to your data

Managed Cloud Security

• 99.9% uptime SLA with automated failover

• Automatic security updates and patches

• Daily encrypted backups with point-in-time recovery

• DDoS protection and WAF included

• 24/7 security monitoring and incident response

Questions About Security?

Our security team is here to help with your compliance and security requirements.