How we store your personal information

We try to make sure that your personal information (such as emails, names, phone numbers etc.) does not leak from our systems.

Even if the server and the database are both compromised the attacker cannot see your personal information.

Typical flow:

Unfortunately in typical scenario personal information is stored and handled in plain text format.

If attacker gains access to the database, attacker can see all your personal information.

Typical email flow

Our flow:

Personal information (such as email) is encrypted with public key upon saving to the database.

We can only decrypt it with our private key.

Our email flow Go back