AES-256-GCM encryption
Every stored credential is encrypted with a per-credential data encryption key using AES-256 in GCM authenticated mode. A unique 128-bit IV is generated for each encryption operation.
Encryption, access controls, rate limiting, and session management — built into the platform from the start.
Every stored credential is encrypted with a per-credential data encryption key using AES-256 in GCM authenticated mode. A unique 128-bit IV is generated for each encryption operation.
Data encryption keys are themselves encrypted by a hardware-backed AWS KMS customer-managed key. Plaintext keys are zeroed from memory immediately after use.
Access tokens expire after 15 minutes. Refresh tokens last 7 days. Every request validates that the device session has not been revoked in the database.
All connections use HSTS with a one-year max-age, subdomains included, and preload enabled. Clickjacking is blocked with frame-ancestors set to none.
Login attempts, registration, and API calls are rate-limited per endpoint. Plan-based quotas enforce separate limits for free, pro, and enterprise tiers.
TOTP-based MFA with 8 one-time recovery codes. Challenge tokens expire after 10 minutes and lock after 5 failed attempts.