Security & Privacy
At Zek, we believe that productivity tools should never compromise your privacy. Our security model is built on the principles of end-to-end encryption and zero-knowledge architecture.
Our Security Approach
End-to-End Encryption
All your data is encrypted before it leaves your device:
- Your data is encrypted using AES-256, a military-grade encryption standard
- Encryption and decryption happen locally on your device
- Only encrypted data is transmitted to and stored on our servers
- Your encryption keys never leave your device
Zero-Knowledge Architecture
We’ve designed our systems so that we cannot access your data:
- We never receive or store your encryption keys
- We cannot decrypt your data even if compelled by law enforcement
- Even our own employees cannot access your unencrypted data
- In the unlikely event of a data breach, your information remains encrypted
Authentication Security
We use modern authentication methods to protect your account:
- Passwords are never stored in plain text
- We support two-factor authentication for additional security
- Session management with automatic timeouts
- Suspicious login detection and prevention
Data Protection
Data in Transit
All communication between your devices and our servers is protected:
- TLS 1.3 encryption for all data transfers
- Certificate pinning in our apps to prevent man-in-the-middle attacks
- Secure WebSockets for real-time updates
Data at Rest
Your data is securely stored on our servers:
- All data is stored in its encrypted form
- Database-level encryption for additional protection
- Regular security audits and penetration testing
- Redundant backups to prevent data loss (while maintaining encryption)
Your Privacy
We are committed to protecting your privacy:
- We collect only your email as personal information so we can verify your identity
- We do not collect any personal information from your devices
- We do not track your browsing habits
- We do not sell your data to third parties
- We are transparent about our data practices
For more details, please review our Privacy Policy.
Security Best Practices
To keep your account secure:
- Use a strong, unique password
- Enable two-factor authentication
- Keep your devices secure and updated
- Be cautious of phishing attempts
- Log out when using shared devices
Security Concerns?
If you have any security concerns or want to report a vulnerability, please contact us immediately at support@zek.tools.