Every piece of sensitive data is encrypted before it's written to the database.
Encrypted with AES-256-GCM envelope encryption. Each message gets its own random encryption key, wrapped with a key unique to your account. Your information is stored as ciphertext that cannot be read without your account's key.
Encrypted at the field level with a per-user key. Email lookups use blind indexes so we can search encrypted records without decrypting them.
Hashed with Argon2id, the current gold standard for password hashing. PINs and passwords are never stored — only their irreversible hashes. Argon2id is resistant to GPU and ASIC brute-force attacks.
Hashed before storage. The raw token is shown once when created and never stored or retrievable.
When your safety check-in activates or a trusted contact activates your plan, the server decrypts your messages and delivers them to the people you designated. This is how Break Glass can deliver your information when you're unable to act yourself.
We protect this capability with multiple layers of infrastructure hardening: full-disk encryption, hardware-backed key protection, strict access controls, and tamper-detectable audit logging.
Self-hosted on dedicated hardware — not shared cloud infrastructure.
| Disk encryption | Full-disk encryption at rest. All data including swap is encrypted. |
|---|---|
| Key protection | Hardware-backed key protection. The master key cannot be extracted if the server is physically removed. |
| TLS | TLS 1.2+ only (legacy versions disabled). SSL Labs A+ rated. HSTS enabled. |
| Network | Reverse tunnel ingress — no public ports exposed on the origin server. Traffic filtered through enterprise-grade DDoS and WAF protection. |
| Security headers | Strict Content Security Policy, Permissions-Policy, X-Frame-Options, Referrer-Policy, X-Content-Type-Options. |
| Logging | Structured logging with automatic redaction of sensitive data. PII, encryption keys, tokens, and passwords never appear in logs. |
| Database | Internal network only — not exposed to the host or internet. |
| Password hashing | Argon2id with tuned parameters. Passwords are never stored — only irreversible hashes. |
|---|---|
| Two-factor auth | TOTP (time-based one-time passwords) with backup codes. |
| Session management | httpOnly, Secure, SameSite=Lax cookies. Sessions are cryptographically signed. |
| Brute-force protection | Rate limiting and progressive lockout on authentication and activation attempts. |
| Activation security | Two-factor channel separation: activation URL delivered via email, PIN shared out-of-band (in person, phone call, separate app). Compromise of one channel is insufficient. |
| Multiple approvals | Optional requirement for multiple trusted contacts to independently approve before a plan activates. No single person can trigger alone. |
Every significant action is recorded in an append-only audit log with cryptographic chaining. Each entry's integrity hash incorporates the previous entry, creating a tamper-detectable chain — if any entry is modified or deleted, the chain breaks and the tampering is visible.
The audit log records: activation attempts, PIN verification results, scenario activations, settings changes, login events, and notification delivery outcomes. All entries are scoped per user — you can only see your own audit history.
If you discover a security vulnerability, please report it to [email protected]. We commit to acknowledging reports within 48 hours and providing a fix timeline within 7 days.
Our security.txt file provides machine-readable contact information per RFC 9116.
We do not currently offer monetary bounties, but we credit all researchers who report valid vulnerabilities in our security acknowledgments.
For security researchers and technical evaluators.
Break Glass uses server-side key management to enable automated emergency delivery. The safety check-in must be able to decrypt and deliver your information when you can't act yourself — this requires the server to hold decryption capability.
We mitigate this with defense in depth: full-disk encryption, hardware-backed key protection, per-user key derivation, strict access controls, and tamper-detectable audit logging. This is the same server-side key management model used by major cloud services that offer automated processing of encrypted data.
For maximum security, store instructions for WHERE to find sensitive credentials (e.g., "the seed phrase is in the fireproof safe, combination is...") rather than the credentials themselves. Break Glass is designed as an emergency instructions delivery system.