Security Features
Protection built into every layer
Protection built into every layer. We use industry-leading security measures to ensure your memories remain safe and private at all times.
Device Security
- 🔐Face ID/Touch ID support
Biometric authentication for instant secure access
- 🔑App-level password option
Additional password layer for extra security
- ⏱️Automatic lock on exit
App locks when you switch away or close
- 📸Screenshot prevention option
Block screenshots for sensitive content
- 🛡️Secure enclave usage
Hardware-level security for encryption keys
Data Encryption
Encryption Standards
- • AES-256 encryption standard
- • End-to-end for sync
- • Encrypted at rest
- • Secure key management
- • Zero-knowledge architecture
What's Protected
- • All journal entries
- • Photos and media
- • AI conversations
- • Personal settings
- • Backup data
Network Security
Connection Protection
- ✓ HTTPS only connections
- ✓ Certificate pinning
- ✓ No tracking cookies
- ✓ Minimal data transmission
- ✓ Anonymous usage stats only
- ✓ Secure API endpoints
Account Protection
- Two-factor authentication - Optional extra security layer
- Session management - Control active sessions
- Login notifications - Alert on new device access
- Password requirements - Strong password enforcement
- Account recovery - Secure recovery options
Security Best Practices
For You
- • Use Face/Touch ID
- • Set strong password
- • Enable auto-lock
- • Regular backups
- • Update app regularly
We Handle
- • Security audits
- • Penetration testing
- • Vulnerability patches
- • Threat monitoring
- • Incident response
Together
- • Privacy first
- • Trust building
- • Transparency
- • Quick updates
- • Open communication
Compliance & Standards
We adhere to international security standards:
- • GDPR compliant (Europe)
- • CCPA compliant (California)
- • SOC 2 Type II certification
- • ISO 27001 standards
- • Regular third-party audits
Incident Response
If Something Happens
- 1. Immediate containment - Stop any breach
- 2. User notification - Within 72 hours
- 3. Full investigation - Understand scope
- 4. Remediation - Fix vulnerabilities
- 5. Prevention - Improve defenses
Security Questions
Q: Is my data encrypted on my phone?
Yes, all data is encrypted using AES-256 both in storage and transmission.
Q: Can hackers access my journal?
Multiple security layers protect against unauthorized access, including encryption and authentication.
Q: What if I lose my phone?
Your data remains encrypted and inaccessible without your authentication. Remote wipe is available.
🛡️ Your Security Matters
We invest heavily in security so you can focus on what matters - capturing and reflecting on your memories without worry.
Was this article helpful?