Main Security Principles
- Reliable data access: We ensure that you can manage and access your sensitive data whenever and wherever you need it, reliably and securely, whether you are offline or online.
- No one can see your data, except you: Locker is a solution that combines both Zero-Knowledge Encryption and End-to-End Encryption, meaning data is only encrypted and decrypted on your own device; the Locker server only handles transferring and storing encrypted data. This ensures that no one, including the Locker server, can decrypt and view this sensitive data except you, the person holding the Master Password as well as the keys to access and decrypt everything.
- Applying the best security technologies: Locker applies the highest standards in the security industry to store and transmit your sensitive data. Our designs help you defend against dangerous attacks such as brute-force or unauthorized data access.
- Secure storage infrastructure: We currently use the network infrastructure of world-leading service providers (AWS, Digital Ocean) to store your data; this helps ensure the system is always operated safely and reliably.
- Timely incident response: The Locker team operates the system 24/7. We monitor all anomalies and respond immediately to any issues.
- Continuous security assessment: Locker runs a Bug Bounty program for world-leading researchers to continuously evaluate and perform penetration testing. CyStack’s team of security experts also directly assesses and analyzes risks to the system on a regular basis to ensure Locker is always in the best security condition.
- Centralized management: For businesses, Locker provides a web-based admin dashboard. Here, administrators can set up security policies, monitor security status, and generate reports. All user activities are logged so that administrators can analyze and evaluate them.