Security Overview
Last updated: June 27, 2025
We protect your data
- All data are written to multiple disks instantly and stored in multiple locations. Files that our customers upload are stored on servers that use modern distributed techniques to remove bottlenecks and points of failure.
Call Data Security
- All call recordings and communications are protected using industry-standard security measures:
- End-to-end encryption for all voice calls and text communications
- Secure storage with encryption at rest for all call recordings
- Strict access controls limiting who can access call data
- Regular security audits of our call handling systems
Your data are sent using HTTPS
- Whenever your data are in transit between you and us, everything is encrypted, and sent using HTTPS. Within our firewalled private networks, data may be transferred unencrypted.
- Any files which you upload to us are stored and are encrypted at rest. Our application databases are generally not encrypted at rest — the information you add to the applications is active in our databases and subject to the same protection and monitoring as the rest of our systems. Our database backups are encrypted using GPG.
Regularly-updated infrastructure
- Our software infrastructure is updated regularly with the latest security patches. Our products run on secured networks and carefully monitored. While perfect security is a moving target, we work with security researchers to keep up with the state-of-the-art in web security.
We protect your billing information
- We use Stripe, a PCI Service Provider Level 1 certified payment processor, to handle all billing information. Your payment details are never stored on our servers or directly accessed by our team.
- Stripe securely processes all transactions using industry-standard encryption and security measures. For more information about Stripe's security, you can visit their security documentation.
Constant monitoring
- We have a team dedicated to maintaining your account's security on our systems and monitoring tools we've set up to alert us to any nefarious activity against our domains.
- We also audit internal data access. If a 0x4d2 employee wrongly accesses customer data, they will face penalties ranging from termination to prosecution.
- We have processes and defenses in place to keep our streak of 0 data breaches going. But in the unfortunate circumstances someone malicious does successfully mount an attack, we will immediately notify all affected customers.
Have a concern? Need to report an incident?
- Have you noticed abuse, misuse, an exploit, or experienced an incident with your account? Please visit our security response page for details on how to securely submit a report.