Security

We take security seriously.

What we do to protect your data, and how to reach us if you find something we missed.

Practices

How we protect your data.

01

Encryption

In transit and at rest.

All traffic uses TLS 1.2 or higher. Database backups and customer data at rest are encrypted using provider-managed keys.

02

Authentication

Password and 2FA.

Passwords are hashed with industry-standard algorithms. TOTP-based two-factor authentication is available on every account, with single-use backup codes.

03

Access controls

Least-privilege by default.

Role-based access at the organization level, plus a dedicated admin role for site-wide moderation. Every privileged action is written to an audit log.

04

Auditability

Tamper-evident logs.

Authentication events, role changes, and administrative actions are recorded with PII redaction enabled by default and 90-day retention.

Disclosure

Responsible disclosure.

Found a vulnerability? Email [email protected]. Please include reproduction steps, affected URLs, and your assessment of impact. We aim to acknowledge reports within two business days and to work with you toward a coordinated fix.

Our machine-readable disclosure contact is published at /.well-known/security.txt per RFC 9116.

See also our Privacy Policy and our Terms of Service for what data we process and on what basis.

We use cookies

Strictly-necessary cookies keep you signed in and protect this site. Optional cookies help us remember preferences and understand product usage. See our Cookie Policy for the full list.