We describe our security design in our white paper.
We’ve documented our entire security design for experts to review. Here are just a few of the processes we cover:
- Tamper-proof, authenticated encryption
- Brute-force protection with PBKDF2
- Secure vault sharing
- Account recovery