Back to Home
AEGIS

Security

How we protect your data and privacy

Zero-Knowledge Architecture

Our zero-knowledge architecture means we mathematically cannot access your data. Your encryption keys are derived from your password and never leave your device. Even if our servers were compromised, attackers would only find encrypted data that's impossible to decrypt.

How It Works

  1. Your password creates a unique encryption key using PBKDF2 with 100,000 iterations
  2. All data is encrypted client-side before transmission using AES-256-GCM
  3. Only encrypted data is stored on our servers
  4. Decryption only happens on your device with your key

Encryption Standards

Data at Rest
AES-256-GCM
Data in Transit
TLS 1.3
Key Derivation
PBKDF2-SHA256
Password Hashing
Argon2id
Forward Secrecy
ECDHE
VPN Protocol
WireGuard

No Logs Policy

We maintain a strict no-logs policy. We do not store, collect, or share any information about your browsing activity, connection timestamps, IP addresses, or bandwidth usage.

What We Never Log

  • • Browsing history or traffic destination
  • • Connection timestamps
  • • Original IP addresses
  • • DNS queries
  • • Bandwidth usage per user
  • • Session duration

Independent Audits

We regularly undergo independent security audits by leading cybersecurity firms to verify our security claims and identify potential vulnerabilities.

Infrastructure Audit

Q1 2025

Comprehensive review of server infrastructure, network security, and access controls.

Code Audit

Q2 2025

Third-party review of cryptographic implementations and application security.

Audit reports will be published here upon completion.

Responsible Disclosure

We welcome security researchers to report vulnerabilities responsibly. We commit to working with researchers in good faith and will not pursue legal action against those who follow our disclosure policy.

Report a Vulnerability

Please send vulnerability reports to security@aegis.security

Include detailed reproduction steps and we'll respond within 48 hours.

Security Team

Our security team includes veterans from leading cybersecurity organizations with decades of combined experience in cryptography, network security, and threat analysis. We're committed to continuous improvement of our security practices.