Security at SavirOS
Your thinking is your most private data. We build systems that protect it with the same seriousness we'd want for our own.
Core Principles
Your data belongs to you
Full ownership. Export anytime. Delete permanently. We're custodians, not owners.
Never sold or shared
No data brokers. No advertisers. No third-party analytics on your content.
No model training
Your data never trains AI models—ours or anyone else's. Ever.
Encrypted everywhere
Data encrypted at rest and in transit. Your thoughts stay private.
How We Protect Your Data
Data Encryption
All data is encrypted using industry-standard protocols:
- In Transit: All connections use TLS 1.3 encryption. We enforce HTTPS across all endpoints with HSTS headers.
- At Rest: Data stored in our databases is encrypted using AES-256 encryption.
- Backups: All backup data is encrypted with separate encryption keys.
Infrastructure Security
SavirOS is built on enterprise-grade cloud infrastructure:
- Hosting: Our services run on Google Cloud Platform (Firebase), which maintains SOC 2, ISO 27001, and other compliance certifications.
- Database: We use Firebase Firestore with automatic encryption, replication, and redundancy.
- CDN: Static assets are served through Vercel's global edge network with DDoS protection.
- Isolation: Each user's data is logically isolated and access-controlled.
Authentication & Access Control
We implement multiple layers of authentication security:
- Password Security: Passwords are hashed using bcrypt with appropriate cost factors. We never store plaintext passwords.
- Session Management: Secure, HTTP-only cookies with appropriate expiration. Sessions can be revoked at any time.
- Magic Links: Passwordless authentication option with time-limited, single-use tokens.
- Rate Limiting: All authentication endpoints are rate-limited to prevent brute force attacks.
Application Security
Our application implements security best practices:
- Content Security Policy: Strict CSP headers prevent XSS attacks and unauthorized script execution.
- Input Validation: All user inputs are validated and sanitized before processing.
- SQL Injection Prevention: We use parameterized queries and ORMs that prevent injection attacks.
- CSRF Protection: All state-changing operations are protected against cross-site request forgery.
- Security Headers: We implement X-Frame-Options, X-Content-Type-Options, Referrer-Policy, and other protective headers.
Data Handling Practices
We follow strict principles for how we handle your data:
- Minimal Collection: We only collect data necessary for the service to function.
- No Aggregate Analysis: We do not analyze patterns across users or use your data for product analytics.
- No Third-Party Sharing: Your content is never shared with third parties for any purpose.
- AI Processing: When SavirAI processes your data, it's used only to generate your response and is not retained for training.
- Audit Logging: We maintain logs for security purposes, but these contain metadata only—not your content.
Data Portability & Deletion
You have full control over your data:
- Export: Pro users can export their complete record in JSON format at any time.
- Deletion: You can delete individual captures or your entire account. Deletion is permanent and irreversible.
- Account Closure: When you close your account, all your data is permanently deleted within 30 days.
- No Lock-in: Your data is portable. You can leave anytime with your complete history.
Employee Access
We maintain strict controls on internal access:
- Principle of Least Privilege: Employees only have access to systems necessary for their role.
- No Content Access: Our team does not access user content except when explicitly requested for support, with user consent.
- Access Logging: All access to production systems is logged and auditable.
Compliance & Privacy
We build with privacy regulations in mind:
- GDPR: We support data portability, right to deletion, and transparent data practices for EU users.
- Data Minimization: We collect only what's necessary and retain it only as long as needed.
- Privacy by Design: Privacy considerations are built into our architecture, not bolted on.
For more details, see our Privacy Policy.
Incident Response
We have procedures in place for security incidents:
- Monitoring: We use error tracking and monitoring to detect issues quickly.
- Response Plan: We have documented procedures for identifying, containing, and resolving security incidents.
- Notification: In the event of a breach affecting your data, we will notify you promptly as required by applicable law.
Third-Party Services
We use a limited number of trusted third-party services. Here's what they can and cannot access:
| Service | Purpose | Data Access |
|---|---|---|
| Google Cloud / Firebase | Database & Authentication | Stores encrypted data; no content access |
| Vercel | Hosting & CDN | Application code only; no user data |
| OpenAI | SavirAI Processing | Processes queries; data not used for training |
| Razorpay / Stripe | Payment Processing | Payment info only; no content access |
| Resend | Transactional Email | Email addresses only for delivery |
| PostHog | Product Analytics | Usage patterns only; no content access |
| Sentry | Error Tracking | Error logs only; no user content |
Security Questions or Concerns?
If you discover a security vulnerability or have questions about our security practices, please contact us. We take all reports seriously.
Last updated: January 2026