Security¶
Security measures¶
- You can only log in after providing your email, password, and 2FA code, and after approving your device via email.
- Your private data is encrypted using unique encryption keys generated for your installation. This provides protection against database-only breaches. You control both the encryption keys and the database.