Security

Your data is protected

Our platform is built on modern cryptography and secure infrastructure to protect your data. From document uploads to generated content, your data is protected by our Zero-Access Architecture.

Zero Knowledge

We never have access to your documents, analysis and generated data.

Encrypted in transit

No one can access or read your data while in transit.

Encrypted at rest

Data stored on our servers is all encrypted meaning without a decryption key, no one can read your data

Private Key Ownership

Decryption keys are stored encrypted based on your password. We've implemented a 2 security layer approach where the keys required to read your data are encrypted by your password itself.

Private Key Ownership

Decryption keys are stored encrypted based on your password. We've implemented a 2 security layer approach where the keys required to read your data are encrypted by your password itself.

Identity Verification & Access Control

We have implemented robust access control options that give you full control of who can read and edit your data. All data is encrypted separately for each of the users, meaning that sharing your documents with your colleagues does not reduce security protocols applied to all your data.

Infrastructure Security

Secure Hosting

SOC2 compliant data centers

TLS Encryption

Enforced in-transit encryption

DDoS Mitigation

Automated network protection

Firewall Enforcement

Strict access policies

Firewall Enforcement

Strict access policies

Human Safety Controls

Full control over who has access

Audit logs for compliance and accountability

Full data retention control

Data retention policies

© All right reserved by Questtor Limited

© All right reserved by Questtor Limited