Security

Last Updated: November 30, 2025


Our Security Commitment

At TimOS, security is not an afterthought - it's foundational to our architecture. We are a compliance company first, and we build products that reflect enterprise-grade security practices from the ground up.

Encryption Architecture

Envelope Encryption

All user content is protected using a two-layer envelope encryption scheme:

  • Master Encryption Key (MEK): AES-256-GCM key stored in a secure key vault
  • Data Encryption Key (DEK): Per-user key encrypted by the MEK
  • Content Encryption: User data encrypted with their unique DEK

Crypto-Shredding

When you delete your account, your DEK is permanently destroyed. Without the key, your encrypted data becomes cryptographically unrecoverable - even by us.

Authentication Security

  • Multi-Factor Authentication: TOTP-based MFA required for all accounts
  • Secure Password Storage: Passwords hashed with bcrypt (cost factor 12)
  • Brute Force Protection: Account lockout after failed attempts
  • Device Trust: Trusted device management with fingerprinting
  • Session Security: HttpOnly cookies with CSRF protection

Infrastructure Security

  • TLS Everywhere: All connections encrypted with TLS 1.3
  • Rate Limiting: Protection against abuse and DDoS
  • Input Validation: Strict validation using Zod schemas
  • Request Size Limits: Protection against payload attacks
  • Security Headers: HSTS, CSP, X-Frame-Options, etc.

Data Protection

  • Dual Database Architecture: Separation of platform and vault data
  • Encrypted Backups: All backups are encrypted at rest
  • Audit Logging: Comprehensive logging of security events
  • Data Residency: Options for data location requirements

Vulnerability Disclosure

We welcome responsible security research. If you discover a vulnerability:

How to Report

  • Email: security@timos.app
  • Please include detailed steps to reproduce the issue
  • Allow us reasonable time to respond and fix the issue
  • Do not publicly disclose until we've addressed it

What We Promise

  • Acknowledge receipt within 48 hours
  • Provide regular updates on our progress
  • Credit you in our security acknowledgments (if desired)
  • Not take legal action against good-faith researchers

Scope

In-scope:

  • timos.app and all subdomains
  • TimOS API endpoints
  • Mobile applications

Out of scope:

  • Social engineering attacks
  • Physical attacks on our infrastructure
  • Denial of service attacks
  • Third-party services we use

Compliance

TimOS is designed to support compliance with:

  • GDPR (General Data Protection Regulation)
  • CCPA (California Consumer Privacy Act)
  • SOC 2 Type II (in progress)
  • HIPAA (for healthcare customers with BAA)

Contact

For security-related inquiries: security@timos.app