Security & Privacy Hub
At Abyrint, security and privacy are not afterthoughts; they are foundational principles engineered into every layer of the connect.abyrint.com platform.
We believe in transparency and verifiable security. That’s why we control our full technology stack—from the server hardware to the application code—minimizing reliance on opaque third-party services and giving us direct oversight of the measures protecting your data. This hub provides a detailed, factual overview of our practices, designed to give you complete confidence in how your information is handled.
Our Guiding Documents
Dive into the specifics of our security and privacy framework through these key documents.
📄 Privacy Policy
Learn exactly what minimal data we collect, how your identity is protected with an anonymous ID, and our strict policies on data retention and deletion. This document also covers our commitment to EU-only data residency and our responsible use of AI services.
🛡️ Security Measures
Explore a comprehensive breakdown of our multi-layered security strategy. This covers everything from application-level defenses like Passkeys and secure session management to our robust infrastructure, including full-disk encryption, network security, and stringent internal access controls.
🔒 End-to-End Encryption
Discover our advanced security feature. This guide explains how End-to-End Encryption (E2EE) works on our platform, empowering you to protect your most sensitive data in a way that makes it technically impossible for anyone—including Abyrint—to access.
Our Core Principles
Our entire approach is built on these four pillars:
-
Full-Stack Control We build, manage, and secure our own infrastructure using industry-standard open technologies to reduce third-party risk and ensure accountability.
-
Privacy by Default We are committed to data minimization. We collect only your email address for account functions and attribute all contributions to an anonymous ID.
-
Verifiable Security We use transparent and battle-tested technologies like Go, LUKS, WireGuard®, and PostgreSQL instead of opaque, “black-box” solutions.
-
User Empowerment We provide you with powerful tools—from mandatory Two-Factor Authentication (2FA) and remote session control to optional End-to-End Encryption—to manage your security.