Skip to content

Security & Privacy

At Zek, we believe that productivity tools should never compromise your privacy. Our security model is built on the principles of end-to-end encryption and zero-knowledge architecture.

Our Security Approach

End-to-End Encryption

All your data is encrypted before it leaves your device:

  • Your data is encrypted using AES-256, a military-grade encryption standard
  • Encryption and decryption happen locally on your device
  • Only encrypted data is transmitted to and stored on our servers
  • Your encryption keys never leave your device

Zero-Knowledge Architecture

We’ve designed our systems so that we cannot access your data:

  • We never receive or store your encryption keys
  • We cannot decrypt your data even if compelled by law enforcement
  • Even our own employees cannot access your unencrypted data
  • In the unlikely event of a data breach, your information remains encrypted

Authentication Security

We use modern authentication methods to protect your account:

  • Passwords are never stored in plain text
  • We support two-factor authentication for additional security
  • Session management with automatic timeouts
  • Suspicious login detection and prevention

Data Protection

Data in Transit

All communication between your devices and our servers is protected:

  • TLS 1.3 encryption for all data transfers
  • Certificate pinning in our apps to prevent man-in-the-middle attacks
  • Secure WebSockets for real-time updates

Data at Rest

Your data is securely stored on our servers:

  • All data is stored in its encrypted form
  • Database-level encryption for additional protection
  • Regular security audits and penetration testing
  • Redundant backups to prevent data loss (while maintaining encryption)

Your Privacy

We are committed to protecting your privacy:

  • We collect only your email as personal information so we can verify your identity
  • We do not collect any personal information from your devices
  • We do not track your browsing habits
  • We do not sell your data to third parties
  • We are transparent about our data practices

For more details, please review our Privacy Policy.

Security Best Practices

To keep your account secure:

  1. Use a strong, unique password
  2. Enable two-factor authentication
  3. Keep your devices secure and updated
  4. Be cautious of phishing attempts
  5. Log out when using shared devices

Security Concerns?

If you have any security concerns or want to report a vulnerability, please contact us immediately at support@zek.tools.