Results
No results found.
Product Security is paramount to Locker before we bring the product to users. We believe that securing a product is not a one-time event but a continuous process. For the Locker team, secure product design and implementation have an indispensable role in software development. At the same time, we are also aware that there can be security vulnerabilities out of the initial design scope. Therefore, security monitoring and testing are performed on a daily basis at Locker.
Locker applies 3 methods of security testing:
Security testing is done as a precaution and we will address any security issues as soon as they are discovered. It should be emphasized that no matter how critical a security issue may be, none of the Locker user data would be accessible to any bad actor.
Even in the unlikely event of Locker being hacked or the database being leaked, user data will remain perfectly safe because Locker uses End-to-end Encryption and user data has been locally encrypted. Any leaked data would look like gibberish to attackers.