Security Overview

Subscribe to updates

See how this document has changed over time or see updates on GitHub.

Table of Contents

Introduction

Protecting customer data is one of our most serious obligations. We invest heavily in security not just because our customers depend on it, but because our own sensitive business information lives on the same infrastructure. That shared stake keeps us focused. When we harden our systems, we are protecting ourselves just as much as we are protecting you.


Access Control and Organizational Security

Personnel

Every employee and contractor at Actually Reliable signs a confidentiality agreement before receiving access to our codebase or any customer data. We perform background checks on all new hires and contractors. Security awareness is part of onboarding and ongoing training at all levels of the organization. Remote server access is available exclusively through our VPN with two-factor authentication enforced, and is restricted to those whose roles require it. All account access is logged by IP address.

Dedicated Teams

Our Operations and Security teams are jointly responsible for access management, identity systems, network configuration, firewall rules, and log management. Their ongoing responsibilities include:

  • Reviewing all code and infrastructure changes against established security guidelines and best practices (including OWASP)
  • Building and operating the infrastructure that underpins our Services, including authentication, monitoring, and audit logs
  • Designing, testing, and iterating on incident response procedures
  • Triaging and responding to security alerts
  • Detecting and escalating anomalous activity
  • Deploying application-level encryption and tooling to protect customer data from internal exposure

Audits, Standards, and Compliance

Payment processing is handled by Stripe, which maintains PCI compliance on our behalf. We have not yet completed a SOC audit for our own infrastructure, and we are transparent about that gap.


Data Protection and Privacy

Our full Privacy Policy is available at actuallyreliable.com/legal/privacy . The following summarizes our most important data protection practices.

Data Location

Data centers we utilize are primarily located in the United States. All data is written to multiple disks simultaneously and stored redundantly across multiple physical locations. Customer-uploaded files are distributed across storage systems engineered to eliminate single points of failure.

Encryption In Transit and At Rest

All data transmitted over public networks is protected using strong encryption via SSL/TLS certificates. Files uploaded to our platform are encrypted at rest using AES-256 with ChaCha20-Poly1305. Each file is encrypted with a unique data encryption key (DEK), which is itself encrypted using our company’s master key. Those files are also sliced, replicated, and distributed across geographically separate data centers, connected via private, end-to-end encrypted network links. Data integrity is verified using SHA3-512. Application database records are encrypted at rest by our database provider (PlanetScale) using AES encryption on underlying storage media. All passwords are hashed using Argon2id (memory-hard password hashing) before storage. Off-site backups are encrypted using the same method as files.

Physical Security

Data centers we utilize are secured by our hosting providers with biometric access controls and continuous interior and exterior video surveillance. Access is restricted to authorized personnel. Around-the-clock on-site security staff provides an additional layer of protection against unauthorized access.

Law Enforcement Requests

We will not provide your data to law enforcement without a valid court order. We categorically reject requests — from local, state, or federal agencies — that are not accompanied by one. Unless we are legally barred from doing so, we will inform you when such a request is received.

Data Deletion

Your content becomes inaccessible the moment your Account is cancelled. All content is permanently deleted from our systems within 60 days. Once permanently deleted, this data cannot be recovered.

For more information, see our Privacy Policy at actuallyreliable.com/legal/privacy .


Full Redundancy for All Major Systems

The infrastructure at data centers we utilize — power supplies, network connectivity, cooling, and environmental systems — is built for full redundancy. Our architecture is designed so that the failure of multiple servers simultaneously does not take our Services offline.


Regularly Updated Infrastructure

We apply security patches to our software infrastructure on a continuous basis. Our products operate on a dedicated, firewalled network that is actively monitored. Security is never a finished problem, and we work with external security researchers to stay current with emerging threats and techniques.


Billing Information

All payment card transactions are processed using the same level of encryption employed by major financial institutions. Card data is transmitted, stored, and processed exclusively on a PCI-compliant network via our payment processor.


Incident Management and Disaster Recovery

We conduct regular disaster recovery drills that simulate a range of failure and attack scenarios. All databases are backed up regularly, and file backups are created automatically upon upload. Backup integrity is tested on a routine basis. Off-site backups are retained for a maximum of 60 days. Our Operations and Security teams maintain documented procedures for incident response. In the event of an incident, we will contact your Account Owner within 72 hours and remain engaged with you throughout the resolution process.


Constant Monitoring

We maintain a dedicated team responsible for monitoring our infrastructure for suspicious or malicious activity. Internal data access is audited. Any employee found to have accessed Customer Data without authorization will face disciplinary action, up to and including termination and referral for prosecution.

If a security breach does occur, all affected customers will be notified within 72 hours of our becoming aware of it.


Security Response

We Welcome Your Input

Security is an area where outside perspective matters. If you have spotted something that concerns you, we want to hear about it.

Reporting Security Problems

Experiencing an active account attack — unauthorized login attempts, suspicious activity, or similar — email us immediately at [email protected] . We treat these with urgency and typically respond within a few hours to help you address the threat.

Discovered a security vulnerability? Send your report to [email protected] . Please include a detailed description of the issue, steps to reproduce it, and your assessment of its potential impact. We will acknowledge receipt within 72 hours.

Other urgent or sensitive security matters relating to our products or your Account should also be directed to [email protected] .

Non-urgent questions or general inquiries that are not security-sensitive can be submitted through our support channel .

How We Handle Vulnerability Reports

When you submit a vulnerability report, here is what happens:

  • We will acknowledge your report within 72 hours.
  • We will triage the report to assess its validity and potential impact.
  • We will investigate the issue and determine its scope. We do not disclose vulnerabilities publicly until they have been fully addressed, but we will communicate openly with you throughout the process.
  • After the issue is resolved, we will publish a security update that includes attribution and thanks to the researcher who reported it.

Our products are built on widely used frameworks and infrastructure. In some cases, a reported vulnerability may affect a technology maintained by a third party. We will work with any affected parties as needed and keep you updated on progress regardless.

Our Commitment to Researchers

Finding and disclosing security vulnerabilities responsibly takes real skill and time. We respect the work that security researchers do, and we are committed to treating every report fairly, responding transparently, and working collaboratively toward resolution.

Other Questions

For security questions not covered above, contact our support team .