Security
Your security is our priority. Learn about our protection measures.
Last updated: 10/15/2025
Encryption in Transit
All data between your device and our servers is encrypted using TLS 1.3.
Encryption at Rest
Your content and personal data are encrypted at rest using AES‑256.
Key Management
We use advanced key management systems and rotate keys regularly.
Hardened Cloud Infrastructure
Our services run in enterprise-grade cloud with layered defenses: firewalls, IDS, and DDoS protection.
Network Segmentation
Critical systems are isolated in protected network segments with limited access and monitoring.
Security Updates
We promptly apply security updates and vulnerability patches.
Role‑based Access
Access follows least privilege with role-based permissions and regular reviews.
Session Management
Sessions use secure tokens with rotation and automatic timeouts.
24/7 Monitoring
Our security team continuously monitors systems for threats and suspicious activity.
Automated Threat Detection
Machine learning analyzes system behavior to detect and mitigate incidents.
Audit Logs
Comprehensive audit logs record access and actions for security analysis and compliance.
We follow industry security best practices appropriate for our size and risk profile. We do not currently claim formal certifications. This page describes our controls and processes.
- JWT access tokens expire after 60 minutes; refresh tokens after 2 days.
- Telegram bot tokens are stored encrypted using a server-side key and are never returned via API.
- Uploaded media is stored under a server upload directory and used solely to publish to Telegram.
- AI generation calls use HTTPS to third‑party providers.
Data Minimization
We collect and store only the minimum data necessary to operate the Service.
Retention Policies
We automatically delete data that is no longer needed according to retention policies.
Backups and Recovery
Regular encrypted backups ensure availability and fast recovery in incidents.
We maintain established security incident response procedures:
Help us keep your account secure by following these guidelines:
- Keep your browser and devices updated
- Log out on shared or public devices
- Report suspicious activity immediately
- Review account activity regularly
If you discovered a vulnerability or have questions about our security, contact our team:
Email: help.4posts@gmail.com
Encryption: PGP key available upon request
Response time: within 24 hours for critical cases