End-to-end encryption
TLS 1.3 in transit, AES-256 at rest, Argon2id memory-hard password hashing.
Every engineering decision asks: what happens if this part leaks? This page explains the answer.
TLS 1.3 in transit, AES-256 at rest, Argon2id memory-hard password hashing.
15-min access JWT + 30-day refresh, instant revocation on logout, TOTP-based 2FA.
HMAC-SHA256 with a daily-rotated salt. We never store raw IPs.
Cloudflare WAF + Turnstile + per-endpoint rate-limits.
Engineering only touches prod DB through a Bastion with full audit log.
Independent external security audit, summary published on this page.
Found a vulnerability? Email us before publishing, and we reply within 24 hours.
| Severity | Reward |
|---|---|
| Critical | 2,500 – 10,000 SAR |
| High | 500 – 2,500 SAR |
| Medium | 100 – 500 SAR |
| Low | Hall of fame + merch |