Our platform is built on modern cryptography and secure infrastructure to protect your data. From document uploads to generated content, your data is protected by our Zero-Access Architecture.
Zero-Access Architecture
We cannot read your data, by design.
Zero Knowledge: We never have access to your documents, analysis and generated data.
Encrypted in transit: No one can access or read your data while in transit.
Encrypted at rest: Data stored on our servers is all encrypted meaning without a decryption key, no one can read your data
Private Key Ownership: Decryption keys are stored encrypted based on your password. We've implemented a 2 security layer approach where the keys required to read your data are encrypted by your password itself.
Identity Verification & Access Control
We have implemented robust access control options that give you full control of who can read and edit your data. All data is encrypted separately for each of the users, meaning that sharing your documents with your colleagues does not reduce security protocols applied to all your data.
Infrastructure Security
Secure Hosting: SOC2 compliant data centers
TLS Encryption: Enforced in-transit encryption
DDoS Mitigation: Automated network protection
Firewall Enforcement: Strict access policies
Human Safety Controls
Full control over who has access
Audit logs for compliance and accountability
Full data retention control
Data retention policies
Contact Us
If you have any questions about our security, please contact us at info@questtor.com