SOC 2 Type II Ready

Zero Trust.
Mathematical Proof.

We don't ask you to trust our admins. We provide cryptographic proof that we cannot access your data. Security is not a policy; it is physics.

The Split-Brain Architecture

We decouple the Control Plane (Next.js) from the Data Plane (Rust).

  • 1
    Keys are never stored with the data (KMS).
  • 2
    Files are encrypted in-flight and at-rest (AES-256).
  • 3
    The Rust Engine operates in a memory-safe enclave.
Request IDe4f9-22a1...
GET /tile/doc_1Rust Engine
fn decrypt_and_render() {
  // Decrypts in RAM only. No disk write.
  let tile = aes_gcm::decrypt(blob, key);
  return webp::encode(tile);
}

Client-Side Encryption

For Government Tenders, we generate the AES key in the browser via WebCrypto API. The key is encrypted with the public key of the Time-Lock Vault. We literally cannot see the files.

Forensic Steganography

Every pixel streamed to a user contains a unique, invisible noise pattern ("DNA"). If a user takes a screenshot and leaks it to the press, our forensic tools can analyze the noise to identify the exact user session and timestamp.

Merkle Audit Logs

Traditional audit logs can be edited by DB admins. Ours are a Blockchain. Every log entry contains the hash of the previous entry. Deleting a row breaks the chain, providing mathematical proof of tampering.

The Glass Wall

We do not send PDFs to the browser. We stream pure pixels (WebP). There is no DOM to inspect, no text to scrape, and no file to download (unless permitted). It is a read-only view of the data.

Compliance Standards

GDPR
SOC2
ISO 27001
POPIA
HIPAA