Your Masters. Protected.
Enterprise-grade security for professional audio
Zero-Knowledge Encryption
What it means:
Zero-knowledge architecture concept — designed so even we could not access your files. Every audio file is encrypted on your device before upload, using AES-256-GCM encryption. We never see your unencrypted data—we only store encrypted bytes.
How it works:
File Selection
You select an audio file to upload (e.g., Master_Final.wav)
Client-Side Encryption
Your browser encrypts the file using AES-256-GCM before any data leaves your device
Encrypted Upload
Only encrypted data is transmitted over TLS 1.3 to our servers
Encrypted Storage
The encrypted file is stored in our Swiss data center. Content is mathematically inaccessible to us
Decryption on Download
File is downloaded encrypted and decrypted in your browser using your key
Technical Details
AES-256-GCM Specifications
- • Algorithm: AES-256-GCM (Galois/Counter Mode)
- • Key size: 256-bit (2^256 possible keys)
- • Mode: Authenticated encryption with associated data (AEAD)
- • Key derivation: PBKDF2 with 100,000 iterations
- • Salt: Unique per user, cryptographically random
Why AES-256-GCM
- • NSA approved for TOP SECRET data
- • NIST recommended
- • FIPS 140-2 validated
- • Used by US Government, banks, militaries worldwide
- • No known practical attacks
- • Quantum resistant (256-bit provides post-quantum security)
Swiss Data Residency Principles
Switzerland has the strongest privacy laws in the world and is not subject to EU or US jurisdiction. Swiss data sovereignty means your data is protected by Swiss data protection principles, which provide strong privacy protections.
Swiss privacy advantages — principles that inspire our design
- • Not subject to CLOUD Act (US)
- • Not subject to EU data retention directives
- • No mandatory data handover to foreign governments
- • Strong privacy tradition (banking secrecy)
- • Federal data protection constitution
- • Criminal penalties for privacy violations
Designed around Swiss data-residency principles
- • Enterprise-grade facilities
- • 24/7 security monitoring
- • Advanced biometric access controls
- • Controlled access entry systems
- • Video surveillance systems
- • Seismic protection systems
- • EMI/RFI protection systems
Infrastructure
Power & Cooling
- • Redundant power supply systems
- • Redundant power systems with backup generators
- • Redundant cooling systems
- • Renewable energy sources
Network
- • High-bandwidth network connectivity
- • Premium ISP connectivity
- • Advanced routing with failover
- • Advanced DDoS protection
Redundancy
- • Triple replication
- • Automated daily snapshots
- • Encrypted cold storage
- • High durability standards
No Logs Policy
What We Don't Log:
- • File names or content
- • Access patterns (who listened to what, when)
- • IP addresses (beyond 24h for security)
- • Device information
- • Browser fingerprints
- • Geographic location
- • Listening duration
- • Download activity patterns
- • Search queries
- • User behavior analytics
What We Do Log:
(Required for Operation)
- • Account creation date
- • Total storage used (number only)
- • Last login timestamp
- • Payment information (encrypted)
- • Support tickets
Temporary security logs (24-hour retention only): Failed login attempts, active session IPs, rate limiting counters
Legal Requests
Even if compelled by Swiss court, we have no file content to provide. Zero-knowledge encryption means we physically cannot access your files, even if legally required.
Our zero-knowledge architecture means we cannot access user data, even under legal compulsion. If we ever receive a legal request, we will fight it and, if legally allowed, notify affected users.
Security Certifications & Audits
GDPR-Aligned
EU data protection principles
Regular Security Testing
Penetration Testing
- • Regular security testing
- • Scope: Infrastructure, apps, APIs
- • Ongoing security assessment program
Vulnerability Scanning
- • Automated scanning: Daily
- • Patch management: <24 hours
- • Zero-day response process
Bug Bounty
- • Security research rewards program
- • Responsible disclosure
- • PGP key available
Questions about our security?
Contact our security team for detailed information about our infrastructure and practices.