Locker uses cloud services from some of the world’s leading providers for its infrastructure. A common characteristic of these providers is that they must meet minimum industry standards such as ISO/IEC 27001 (the ISO organization’s information security management standard), AICPA SOC 2 (the AICPA organization’s data security standard), and CSA (the Cloud Security Alliance’s cloud service security standard).
Locker is designed and built with full redundancy for our data centers, minimizing the risk of inaccessibility. Even when users cannot access the Internet, they can still access their data through a previously downloaded copy on their application.The Locker database and API service are designed in a distributed architecture with continuous synchronization. If a node or even a cluster encounters an issue for any reason, the remaining nodes can continue running to ensure all user operations proceed normally.
Locker stores user data in the form of files and databases on our trusted storage servers. All this data is encrypted with the user’s Master Password, combined with Encryption of Data at Rest from the cloud service providers. No one except the user themselves can decrypt and access this sensitive data.
User data is regularly backed up and stored at dedicated data centers of global cloud service providers such as AWS, GCP, or Azure to ensure that even if an incident occurs, the data remains safe and recoverable.
All data in transit is transmitted through encrypted channels (SSL/TLS) combined with data that has been pre-encrypted with AES-256. With this design, data eavesdropping attacks on the transmission channel (Man-in-the-middle attacks) are fully neutralized.