Safeinity employs industry-standard cryptographic techniques and mandatory server-side encryption to ensure your digital assets remain secure and protected.
Files can optionally be encrypted using your brower - before Safeinity can even see them.
All sensitive data is encrypted with AES-256 before storage.
Passwords are hashed using industry-standard algorithms with unique salts per user.
Files use AES-256-GCM authenticated encryption with unique initialization vectors.
Application secrets are stored securely in AWS Secrets Manager.
Industry-standard symmetric encryption
All sensitive data is encrypted using AES-256 encryption with non-deterministic IV control for secure data storage and retrieval.
Advanced Encryption Standard with 256-bit keys
Unique salt per user, deterministic encryption for login validation
Server-side cryptographic operations via javax.crypto
Each user has unique encryption keys with key versioning for enhanced security
Defense in depth approach
Multiple security layers ensure comprehensive protection against various attack vectors.
End-to-end encrypted communications
Database-level encryption for stored ciphertext
Session timeout with secure cookie configuration
SQL injection prevention via parameterized queries, XSS protection via output encoding
Time-based One-Time Password (TOTP) implementation
Multi-factor authentication using TOTP (RFC 6238) with HMAC-SHA1, providing an additional layer of security for account access.
Mathematical key splitting for distributed trust
Our implementation of Adi Shamir's secret sharing algorithm allows your master encryption key to be mathematically split into multiple shares, requiring a threshold number of shares to reconstruct the original key.
Safeinity leverages industry-leading infrastructure and follows security best practices to protect your digital assets.
Industry-standard cryptographic implementations
Safeinity uses well-established cryptographic libraries and algorithms including Java Cryptography Architecture (JCA), industry-standard encryption protocols, and proven authentication mechanisms to ensure your data remains secure.
Industry-standard javax.crypto implementation with AES-256 encryption
Each user has a unique key
TOTP-based 2FA with backup codes and multiple delivery methods
All sensitive data is encrypted using AES-256 encryption before storage.
We implement strong cryptographic security ensuring your privacy is always protected.