Security in Our Applications
Security is built into our development lifecycle from design to deployment. We combine secure coding practices, automated security tooling, and the use of dedicated hardware for storing sensitive data.
1. Secure Development & Code Scanning
We ensure application security early and continuously by:
2. Storing Sensitive Data in Dedicated Hardware
Wherever possible, we avoid storing sensitive information in application code or standard storage and instead use dedicated hardware and secure enclaves:
Hardware Security Modules (HSM):
- Cryptographic keys (e.g., for TLS, signing, encryption) are generated and stored in HSMs.
- Private keys never leave the HSM; applications communicate with the HSM via secure APIs for signing and decryption operations.
- This minimizes the risk of key exposure, even in the event of a system compromise.
Mobile Devices&Biometrics:
-
On mobile applications, sensitive tokens and keys are stored in OSmanaged secure storage:
- iOS: Keychain + Secure Enclave
- Android: Keystore + hardwarebacked Trusted Execution Environment (TEE), where available
-
User authentication can be bound to biometrics (Face ID, Touch ID, fingerprint, etc.), so:
- Biometric data never leaves the device and is not accessible to the app.
- Highvalue actions (e.g., payment approval, viewing sensitive data) can be protected with a second factor (biometric/OSlevel prompt).