Skip to content

Security

Security measures

  • You can only log in after providing your email, password, and 2FA code, and after approving your device via email.
  • Your private data is encrypted using unique encryption keys generated for your installation. This provides protection against database-only breaches. You control both the encryption keys and the database.