Security & Compliance
Multi-layered encryption, zero text storage, GDPR compliance, and ISO 27001 certified infrastructure. Every design decision prioritizes data protection and EU data sovereignty.
Encryption Layers
Data is protected at every stage with industry-standard and modern cryptographic algorithms. Each layer addresses a specific threat vector.
TLS 1.3
All data transmitted between clients and servers is encrypted with TLS 1.3, the latest transport layer security protocol. Enforced on all connections with no fallback to older versions.
AES-256-GCM
Stored data (account credentials, session metadata, token mappings) is encrypted with AES-256-GCM authenticated encryption. Provides both confidentiality and integrity verification.
XChaCha20-Poly1305
Enterprise zero-knowledge authentication uses XChaCha20-Poly1305 for client-side encryption of token mappings. The server never has access to decryption keys.
Argon2id
Cryptographic keys are derived using Argon2id, the winner of the Password Hashing Competition. Memory-hard and resistant to GPU and ASIC attacks.
BIP39 Recovery Phrase
Enterprise accounts receive a BIP39 mnemonic recovery phrase for key backup. The same standard used in cryptocurrency wallets for deterministic key recovery.
Zero Text Storage
Text submitted for anonymization is processed entirely in memory and immediately discarded after processing. No original text is ever written to disk, logged, or retained.
In-memory processing only
Immediately discarded after processing
No AI model training on submitted text
No third-party data sharing
No data transfer outside the EU
Authentication
Multiple authentication methods with layered session security. The authentication model scales from Professional password-based to Enterprise zero-knowledge proof.
Authentication Methods
- bcrypt — Password hashing for Professional tier accounts
- Zero-Knowledge Proof — Enterprise tier authentication where the server never sees the password
- OAuth 2.0 — Google and Microsoft single sign-on
- 2FA TOTP — Time-based one-time passwords as a second factor
Session Security
- GeoIP Session Management — Sessions are bound to geographic location; anomalous logins trigger re-authentication
- Account Lockout — Automatic lockout after 5 consecutive failed authentication attempts
- Secure Session Tokens — Cryptographically random tokens with configurable expiration
GDPR Compliance
Full GDPR compliance across both Professional and Enterprise tiers. The platform is designed from the ground up with Privacy by Design principles.
Privacy by Design
Data protection is embedded into the architecture from the earliest design stage, not added as an afterthought. Zero text storage is the default, not an option.
DPIA
Data Protection Impact Assessment available for Enterprise deployments. Comprehensive risk analysis for high-risk processing activities involving personal data.
Data Processing Agreement
DPA available for all customers. Defines the scope and purpose of processing, sub-processor obligations, and data subject rights.
Data Subject Rights
Full support for GDPR Articles 15 through 21: access, rectification, erasure, restriction, portability, and objection. 30-day response commitment for all requests.
ISO 27001
Infrastructure operates on ISO 27001 certified hosting. The Enterprise tier includes a fully documented Information Security Management System.
86% Implemented
Professional infrastructure implements 86% of ISO 27001 controls. Hosted on Hetzner ISO 27001 certified data centers with inherited physical and environmental security controls.
- ISO 27001 certified data center infrastructure
- Inherited physical security controls
- Network segmentation and access controls
- Encrypted storage and transport
- Automated security patching
Certified Infrastructure
Enterprise deployments run on fully ISO 27001 certified infrastructure with a documented ISMS covering all Annex A controls applicable to the anonymization service.
- Full ISO 27001 certified infrastructure
- Documented ISMS with 5 core policies
- RBAC: Admin, Editor, User roles
- Incident response with defined SLAs
- Comprehensive audit logging
- Annual review and continuous improvement
Information Security Management System
The Enterprise ISMS comprises five core policies, role-based access control, a tiered incident response framework, and comprehensive audit logging.
ISMS Policies
| Policy ID | Policy Name |
|---|---|
| ISMS-POL-001 | Information Security Policy |
| ISMS-POL-002 | Access Control Policy |
| ISMS-POL-003 | Data Classification Policy |
| ISMS-POL-004 | Incident Response Policy |
| ISMS-POL-005 | Business Continuity Policy |
Role-Based Access Control
Admin
Full system access. User management, configuration, audit log access, and incident response authority.
Editor
Content and workflow management. Can create and manage anonymization sessions, manage token mappings, and access team features.
User
Standard anonymization access. Can analyze and anonymize text, manage own sessions, and view own usage.
Incident Response SLAs
| Priority | Description | Response Time |
|---|---|---|
| P1 — Critical | Data breach, system compromise, or complete service outage | < 1 hour |
| P2 — High | Significant security vulnerability or major feature degradation | < 4 hours |
| P3 — Medium | Non-critical security issue or minor service impact | < 24 hours |
| P4 — Low | Informational security observation or improvement request | < 72 hours |
GDPR-mandated 72-hour breach notification to supervisory authorities for confirmed personal data breaches. Affected data subjects notified without undue delay when the breach is likely to result in a high risk to their rights and freedoms.
Audit Logging Retention
90 Days
Login attempts, session creation, authentication failures, password changes, and 2FA events.
1 Year
User management, role changes, configuration modifications, and system administration events.
1 Year
Incident records, access anomalies, policy violations, and security-relevant system events.
OWASP Top 10 Protection
The application is hardened against the OWASP Top 10 web application security risks. HTTP security headers enforce strict browser-side protections.
Security Headers
Bot Protection
All forms and authentication endpoints are protected by Google reCAPTCHA v3 with a 0.5 score threshold. reCAPTCHA v3 operates invisibly, scoring requests based on behavioral analysis without requiring user interaction.
Security Questions?
Request a detailed security assessment or discuss specific compliance requirements for your organization.