We use strong, market-leading encryption methods to secure all sensitive data both at rest and while it is being transmitted.

We have run rigorous  penetration tests with top-tier independent security consultants in addition to our continuing bug bounty program.

Our production services are housed in a dedicated safe Virtual Private Cloud. At the network’s edge, only protocols that are necessary for our service to function are open.