Security

menu

Security

We protect your security in the following ways

Device OS & Firmware

Monthly security updates across all software installed to ensure any CVEs or reported vulnerabilities are patched

E2E Encryption

All communication with the devices is done using two-way asymmetric cryptography between the Cloud and the Device.

Encryption in Transit

All data in transit is encrypted with TLS as per latest standards and encrypted with ciphers considered secure as per current security recommendations.

Encryption at Rest

All critical and sensitive user data and keys is encrypted using account-level keys stored in HSAM backed secure storage.

2FA Authentication

You can protect your CLI and Cloud access using our TOTP-based integrated 2nd Factor Support. Learn more [Link]

related-card-illustration
Roadmap

Tell us how we can improve security further, contribute on our roadmap.

View roadmap
related-card-illustration
Incident History

All security incidents will be documented in our forums, with the incident impact, root cause analysis, solution and advisory.

Security forum
related-card-illustration
Bug bounty

We appreciate the incredible effort that security researchers and white-hat hackers make to ensure security is maintained and upheld across internet and devices we use.We are a small company, though we cannot commit to the size of bounty, but we will try our best to be fair. Please report any security vulnerability, or even if you have a hunch we would love to talk to you. Email us at [email protected] or check the options on our contact page.