Security Features

Protection built into every layer

3 min read

Protection built into every layer. We use industry-leading security measures to ensure your memories remain safe and private at all times.

Device Security

  • 🔐
    Face ID/Touch ID support

    Biometric authentication for instant secure access

  • 🔑
    App-level password option

    Additional password layer for extra security

  • ⏱️
    Automatic lock on exit

    App locks when you switch away or close

  • 📸
    Screenshot prevention option

    Block screenshots for sensitive content

  • 🛡️
    Secure enclave usage

    Hardware-level security for encryption keys

Data Encryption

Encryption Standards

  • • AES-256 encryption standard
  • • End-to-end for sync
  • • Encrypted at rest
  • • Secure key management
  • • Zero-knowledge architecture

What's Protected

  • • All journal entries
  • • Photos and media
  • • AI conversations
  • • Personal settings
  • • Backup data

Network Security

Connection Protection

  • ✓ HTTPS only connections
  • ✓ Certificate pinning
  • ✓ No tracking cookies
  • ✓ Minimal data transmission
  • ✓ Anonymous usage stats only
  • ✓ Secure API endpoints

Account Protection

  • Two-factor authentication - Optional extra security layer
  • Session management - Control active sessions
  • Login notifications - Alert on new device access
  • Password requirements - Strong password enforcement
  • Account recovery - Secure recovery options

Security Best Practices

For You

  • • Use Face/Touch ID
  • • Set strong password
  • • Enable auto-lock
  • • Regular backups
  • • Update app regularly

We Handle

  • • Security audits
  • • Penetration testing
  • • Vulnerability patches
  • • Threat monitoring
  • • Incident response

Together

  • • Privacy first
  • • Trust building
  • • Transparency
  • • Quick updates
  • • Open communication

Compliance & Standards

We adhere to international security standards:

  • • GDPR compliant (Europe)
  • • CCPA compliant (California)
  • • SOC 2 Type II certification
  • • ISO 27001 standards
  • • Regular third-party audits

Incident Response

If Something Happens

  1. 1. Immediate containment - Stop any breach
  2. 2. User notification - Within 72 hours
  3. 3. Full investigation - Understand scope
  4. 4. Remediation - Fix vulnerabilities
  5. 5. Prevention - Improve defenses

Security Questions

Q: Is my data encrypted on my phone?

Yes, all data is encrypted using AES-256 both in storage and transmission.

Q: Can hackers access my journal?

Multiple security layers protect against unauthorized access, including encryption and authentication.

Q: What if I lose my phone?

Your data remains encrypted and inaccessible without your authentication. Remote wipe is available.

🛡️ Your Security Matters

We invest heavily in security so you can focus on what matters - capturing and reflecting on your memories without worry.

Was this article helpful?