Skip to main content

Security first

We take security seriously to protect your data and ensure a safe, reliable experience. Our security approach includes multiple layers of protection, similar to how a bank secures its money—using safes, alarms, strict access controls, and monitoring systems.

Encryption

Encryption at Rest (Stored Data Protection) All stored customer data is protected using AES-256 encryption, one of the strongest forms of digital security. Think of it like storing valuables in a high-security safe that only authorized people can open. Encryption in Transit (Data Moving Protection) When data travels over the internet (e.g., when you log in, send a message, or chat with your persona), we encrypt it using TLS 1.3+. This is similar to sending a letter in a locked, tamper-proof envelope instead of a postcard.

Infrastructure protection

Daily Backups We save copies of data every night, so if anything goes wrong, we can restore lost information—like a safety net. Firewalls and Access Control Security barriers filter internet traffic, blocking anything suspicious, similar to a security checkpoint at an airport. DDoS Protection We use industry-leading DDoS protection to defend against attacks where hackers try to flood our system with excessive traffic. Network Restrictions Customer data is processed in a secure, isolated environment with restricted access controls.

Monitoring and response

Automated Security Monitoring We use Sentry to continuously monitor our system’s health. If anything unusual happens, an alert is sent to our security team immediately. Audit Logs Every action in our system is recorded, ensuring a clear record of who accessed what, when, and why. Incident Response Plan If something goes wrong, we follow a structured process to detect, analyze, and respond to the issue immediately.

Access control

Role-Based Access Control (RLS) Users and system administrators only get access to the data they need, nothing more. Credential Management We use secure credential management systems to protect passwords and access keys, ensuring they’re encrypted and only accessible to authorized personnel.

Compliance

Regular Security Audits We conduct regular security reviews and updates to ensure our systems remain secure and up-to-date.

Data retention

Your Control You can delete any memory, conversation, or your entire account at any time. Automatic Deletion If you delete your account, all your data is permanently deleted within 30 days. Backups We maintain encrypted backups for disaster recovery. These backups are also deleted when you delete your account.