Security
How we protect your data and privacy
Zero-Knowledge Architecture
Our zero-knowledge architecture means we mathematically cannot access your data. Your encryption keys are derived from your password and never leave your device. Even if our servers were compromised, attackers would only find encrypted data that's impossible to decrypt.
How It Works
- 1Your password generates a cryptographic key using Argon2id
- 2All data is encrypted locally before transmission
- 3We store only encrypted blobs we cannot decrypt
- 4Decryption happens only on your device
Encryption Standards
AES-256-GCM
Industry-standard symmetric encryption
X25519
Modern elliptic curve key exchange
Argon2id
Memory-hard password hashing
Ed25519
Digital signature verification
Infrastructure Security
- SOC 2 Type II Compliant
Annual audits verify our security controls
- Geo-Distributed Infrastructure
Data centers in privacy-friendly jurisdictions
- DDoS Protection
Enterprise-grade network protection
- Intrusion Detection
24/7 monitoring and automated response
Bug Bounty Program
We believe in the power of the security community. Our bug bounty program rewards researchers who responsibly disclose vulnerabilities.
Rewards Range
Contact security@aegis.security to report vulnerabilities.
Security Team
Our dedicated security team monitors threats 24/7 and continuously improves our defenses. For security inquiries, contact us at security@aegis.security