Security is
the product.

Every decision starts with one question: how do we minimize trust surface and maximize user sovereignty? Not as a feature — as a foundation.

100%
Zero-Knowledge Products
48h
Disclosure Response SLA
0
Master Keys Held
100%
GDPR Compliant

PILLAR 01
🔒

Zero-Knowledge Architecture

We cannot read your data — by design. For PassVault and 47mail, all cryptographic operations happen on your device. Our servers see only ciphertext. No master keys exist. No court order, no rogue employee, no infrastructure breach can expose your plaintext data.

AES-256-GCMArgon2id KDFWebCrypto APIE2EE MailSRTP CommsClient-side keys
🔐

Client-side encryption

Keys derived from your master password, never transmitted.

🧮

Cryptographic proofs

Trust mathematics, not our promises.

🚫

Zero master keys

No escrow keys, no recovery keys, no backdoors.

PILLAR 02
🛡

Zero-Trust Networking

Every request authenticated. Every session scoped to least-privilege. Every action audit-logged. We treat our own internal network as hostile.

ControlImplementationStatus
Identity-aware access proxyPomerium — all services behind IAPActive
Single Sign-OnKeycloak (47ID) — all products unifiedActive
mTLS between servicesAutomatic service mesh certificatesActive
Secrets managementHashiCorp Vault — dynamic secrets, lease rotationActive
Network policiesKyverno + Kubernetes NetworkPolicy enforcementActive
Audit loggingLoki — tamper-evident, immutable append-only logsActive
Privileged accessTeleport — session recording, MFA enforcedEnforced
PILLAR 02.5
🇪🇺

GDPR & Data Residency

We are a Romanian company. Our infrastructure is hosted in Romania and the EU. Your data does not leave the European Economic Area. We are subject to Romanian data protection law and GDPR.

Sub-processorPurposeLocationDPA
Hetzner OnlinePrimary infrastructure hostingDE / FI (EU)Signed
Backblaze B2Encrypted backup storageEU regionSigned
CloudflareDNS & DDoS protection onlyEU nodesSigned
StripePayment processing (plans only)IE (EU)Signed
PostmarkTransactional email (non-ZK products)US — SCCSCC

SCC = Standard Contractual Clauses (EU-approved transfer mechanism). Full sub-processor list available on request.

DPO: dpo@the47network.com →
PILLAR 03
🔍

Responsible Disclosure

We take every security report seriously. 48-hour response SLA. No legal threats against good-faith researchers. Public post-mortems for significant findings.

0–2h

Report received & triaged

Encrypted reports via security@the47network.com. Automated acknowledgment within 2h.

48h

Initial response + severity assigned

Full response with severity classification and preliminary remediation plan.

7–30d

Patch released

Critical within 7 days, High within 30. Timeline communicated openly.

Post

CVE + researcher credited

CVE filed, researcher credited publicly, post-mortem published.

Report a Vulnerability → Security Policy
PILLAR 04
📋

Transparent Legal

Git-versioned, plain-language, human-readable. GDPR-compliant by design. No dark patterns, no buried clauses, no data-selling.


What we will never do.

These are unconditional. Not contingent on business circumstances, not subject to future policy changes, not negotiable.

🚫

Never sell your data

We do not sell, license, or broker user data to third parties. Not to advertisers, not to data brokers, not to anyone. Our revenue comes from subscriptions and Studio engagements, not from your information.

🚫

Never show ads

No advertising in any 47Network product. No sponsored placements, no promoted results, no behavioral tracking for ad targeting. A product funded by ads is structurally incentivized to maximize data collection. We are not that product.

🚫

Never add backdoors

No government-mandated backdoors. No law enforcement access keys. For zero-knowledge products, this is enforced by the cryptography — we cannot comply with a decryption request because we hold no decryption keys.

🚫

Never silently break E2EE

If end-to-end encryption is ever removed or weakened in a product, we will communicate this publicly before the change ships. No silent degradation of security guarantees under any circumstances.

How we handle security.

Documented practices, not marketing copy. What we do, how we do it, and what you can hold us to.

🔐

Encryption at rest

All sensitive data encrypted with AES-256-GCM. For zero-knowledge products (PassVault, 47mail), encryption occurs exclusively client-side — our servers store only ciphertext and cannot decrypt it.

🔒

Encryption in transit

TLS 1.3 enforced on all endpoints. HSTS with long max-age and preloading. Internal service communication encrypted with mutual TLS. No plaintext service-to-service traffic.

🛡

Zero-trust access

No implicit trust between internal services. Every call authenticated via 47ID. Privileged access requires MFA and is time-limited. Network policies enforced at the Kubernetes layer via Kyverno.

📋

Audit logging

Tamper-evident audit trail for all privileged operations, authentication events, and admin actions. Logs are append-only with cryptographic chaining. Retained for 12 months minimum.

🔑

Secrets management

All secrets managed in HashiCorp Vault with dynamic credentials and short TTLs. No secrets in environment variables or version control. Every secret access request is audited per-call.

🧪

Security testing

Automated DAST (OWASP ZAP) on every deployment. Dependency scanning via Trivy on every CI run. Periodic manual penetration testing on all externally-facing services via TestGate Studio.

🌍

Data residency

All production infrastructure in EU data centres. No data transferred outside the EU without explicit consent and DPA. GDPR-compliant data processing agreements available for all business clients.

Incident response

Documented IR playbook with defined severity levels. Critical: initial response within 1 hour, client notification within 4 hours. Post-mortems published at status.the47network.com within 72 hours.

Found a security issue? Email security@the47network.com. We acknowledge within 24 hours, triage within 48, and credit researchers in CVE disclosures. We do not pursue legal action against good-faith researchers.

✓ the47network.com and all subdomains
✓ All 47Network products and their APIs
✓ Authentication infrastructure (47ID)
✗ Third-party services and dependencies
✗ Social engineering or physical access

The technical side of trust.

How the security architecture behind our commitments actually works — in detail.