Security
How we protect your data and infrastructure.
Last updated: 2024-09-19
At Proofmesh, we are committed to maintaining the highest standards of security for your data and infrastructure. We implement least-privilege access controls to ensure that only authorized personnel can access sensitive systems and information. All data is encrypted both at rest and in transit, utilizing industry-standard protocols to protect against unauthorized access and interception. Our development process includes mandatory code reviews to identify and remediate potential vulnerabilities before deployment.
We encourage responsible disclosure of security issues. If you discover a vulnerability or have concerns about the security of our platform, please report it promptly to hello@proofmesh.com. We take all reports seriously and will work with you to investigate and address any issues.
Proofmesh leverages advanced cryptographic techniques to ensure the integrity and verifiability of receipts. All receipts are signed using the ed25519 signature scheme and are batched via Merkle trees, enabling efficient and scalable verification for our users.
For organizations with audit and compliance requirements, we offer Write Once Read Many (WORM) storage options to provide immutable, tamper-evident storage of critical data.