Back to Home

Security

How we protect your data and privacy

Security Overview

Security is at the core of everything we do. We use industry-standard practices to protect your data and ensure your privacy is maintained at all times.

Data Protection

Your images are processed locally and never stored on our servers.

Secure Authentication

Industry-standard OAuth 2.0 with Google for secure account access.

Privacy First

Minimal data collection with transparent privacy practices.

Secure Infrastructure

Enterprise-grade hosting with regular security updates.

How We Process Your Data

Local Image Processing

Your uploaded images are processed entirely within your browser using client-side JavaScript. This means:

  • • Your images never leave your device
  • • No image data is transmitted to our servers
  • • Complete privacy and control over your content
  • • Faster processing without network delays

Account Data

When you create an account, we only store:

  • • Your email address (from Google OAuth)
  • • Account preferences and settings
  • • Usage statistics (anonymized)
  • • Subscription status (if applicable)

Payment Processing

All payments are processed securely through Paddle, a PCI-compliant payment processor. We never store your payment information on our servers.

Security Measures

Technical Security

  • HTTPS Encryption:All data transmission is encrypted using TLS 1.3
  • Secure Headers:Security headers protect against common web vulnerabilities
  • Content Security Policy:Prevents XSS attacks and unauthorized script execution
  • Regular Updates:All dependencies and infrastructure are regularly updated

Access Control

  • OAuth 2.0:Secure authentication through Google
  • Session Management:Secure session handling with automatic expiration
  • Rate Limiting:Protection against abuse and brute force attacks
  • IP Monitoring:Monitoring for suspicious activity and unauthorized access

Infrastructure Security

  • Netlify Hosting:Enterprise-grade hosting with built-in security
  • Supabase Database:Encrypted database with access controls
  • CDN Protection:Global content delivery with DDoS protection
  • Backup Systems:Regular encrypted backups with disaster recovery

Incident Response

In the unlikely event of a security incident, we have established procedures to:

  • • Immediately assess and contain the incident
  • • Notify affected users within 72 hours
  • • Work with security experts to investigate and resolve
  • • Implement additional security measures to prevent recurrence
  • • Provide regular updates throughout the incident response process

Security Concerns?

If you discover a security vulnerability or have security concerns, please contact us immediately.

Report Security Issue