What we defend against
The threats that matter. Modeled honestly.
Insider threat
We cannot read your records. The encryption keys never touch our infrastructure. An employee with database access sees ciphertext only.
Server compromise
If our servers are fully compromised, the attacker gets ciphertext. The encryption keys live on your devices. The chain logs every access attempt, including the failed ones.
Government request
We can produce records only via grant tokens you've issued. We cannot decrypt without your participation. Subpoenas land on your inbox, not ours, by design.
Lost device
Your master key is split across devices and a recovery seed. Loss of one device is recoverable. Loss of all devices plus recovery seed is permanent — we cannot recover what we cannot read.