We use strong, market-leading encryption methods to secure all sensitive data both at rest and while it is being transmitted.
We have run rigorous penetration tests with top-tier independent security consultants in addition to our continuing bug bounty program.
Our production services are housed in a dedicated safe Virtual Private Cloud. At the network’s edge, only protocols that are necessary for our service to function are open.