Security

1. Data Encryption

All data transmitted between your device and our servers is encrypted using HTTPS/TLS protocol. Passwords are stored in hashed form (bcrypt).

2. Infrastructure Security

  • Regular security updates
  • 24/7 monitoring and threat detection
  • Automatic data backups
  • Docker container isolation

3. Authorization and Access

We use JWT (JSON Web Tokens) for secure authorization. Tokens have limited validity and can be refreshed.

4. Reporting Security Vulnerabilities

If you discover a security vulnerability, report it immediately to:

Email: security@devstudioit.app

Last updated: November 15, 2025