Your Masters. Protected.

Enterprise-grade security for professional audio

Zero-Knowledge Encryption

What it means:

Zero-knowledge architecture concept — designed so even we could not access your files. Every audio file is encrypted on your device before upload, using AES-256-GCM encryption. We never see your unencrypted data—we only store encrypted bytes.

How it works:

1

File Selection

You select an audio file to upload (e.g., Master_Final.wav)

2

Client-Side Encryption

Your browser encrypts the file using AES-256-GCM before any data leaves your device

3

Encrypted Upload

Only encrypted data is transmitted over TLS 1.3 to our servers

4

Encrypted Storage

The encrypted file is stored in our Swiss data center. Content is mathematically inaccessible to us

5

Decryption on Download

File is downloaded encrypted and decrypted in your browser using your key

Technical Details

AES-256-GCM Specifications

  • • Algorithm: AES-256-GCM (Galois/Counter Mode)
  • • Key size: 256-bit (2^256 possible keys)
  • • Mode: Authenticated encryption with associated data (AEAD)
  • • Key derivation: PBKDF2 with 100,000 iterations
  • • Salt: Unique per user, cryptographically random

Why AES-256-GCM

  • • NSA approved for TOP SECRET data
  • • NIST recommended
  • • FIPS 140-2 validated
  • • Used by US Government, banks, militaries worldwide
  • • No known practical attacks
  • • Quantum resistant (256-bit provides post-quantum security)

Swiss Data Residency Principles

Switzerland has the strongest privacy laws in the world and is not subject to EU or US jurisdiction. Swiss data sovereignty means your data is protected by Swiss data protection principles, which provide strong privacy protections.

Swiss privacy advantages — principles that inspire our design

  • • Not subject to CLOUD Act (US)
  • • Not subject to EU data retention directives
  • • No mandatory data handover to foreign governments
  • • Strong privacy tradition (banking secrecy)
  • • Federal data protection constitution
  • • Criminal penalties for privacy violations

Designed around Swiss data-residency principles

  • • Enterprise-grade facilities
  • • 24/7 security monitoring
  • • Advanced biometric access controls
  • • Controlled access entry systems
  • • Video surveillance systems
  • • Seismic protection systems
  • • EMI/RFI protection systems

Infrastructure

Power & Cooling

  • • Redundant power supply systems
  • • Redundant power systems with backup generators
  • • Redundant cooling systems
  • • Renewable energy sources

Network

  • • High-bandwidth network connectivity
  • • Premium ISP connectivity
  • • Advanced routing with failover
  • • Advanced DDoS protection

Redundancy

  • • Triple replication
  • • Automated daily snapshots
  • • Encrypted cold storage
  • • High durability standards

No Logs Policy

What We Don't Log:

  • • File names or content
  • • Access patterns (who listened to what, when)
  • • IP addresses (beyond 24h for security)
  • • Device information
  • • Browser fingerprints
  • • Geographic location
  • • Listening duration
  • • Download activity patterns
  • • Search queries
  • • User behavior analytics

What We Do Log:

(Required for Operation)

  • • Account creation date
  • • Total storage used (number only)
  • • Last login timestamp
  • • Payment information (encrypted)
  • • Support tickets

Temporary security logs (24-hour retention only): Failed login attempts, active session IPs, rate limiting counters

Legal Requests

Even if compelled by Swiss court, we have no file content to provide. Zero-knowledge encryption means we physically cannot access your files, even if legally required.

Our zero-knowledge architecture means we cannot access user data, even under legal compulsion. If we ever receive a legal request, we will fight it and, if legally allowed, notify affected users.

Security Certifications & Audits

🇪🇺

GDPR-Aligned

EU data protection principles

Regular Security Testing

Penetration Testing

  • • Regular security testing
  • • Scope: Infrastructure, apps, APIs
  • • Ongoing security assessment program

Vulnerability Scanning

  • • Automated scanning: Daily
  • • Patch management: <24 hours
  • • Zero-day response process

Bug Bounty

  • • Security research rewards program
  • • Responsible disclosure
  • • PGP key available

Questions about our security?

Contact our security team for detailed information about our infrastructure and practices.