Data Encryption
How we protect your data with AES-256 encryption, zero-knowledge architecture, and end-to-end security. Profile data, passwords, and API keys are encrypted at rest and in transit.
Your profile data contains login sessions, cookies, and account credentials. We encrypt everything with military-grade AES-256. Even if attackers breach our servers, they can't read your data.
Encryption Standards
We use AES-256-GCM (Advanced Encryption Standard with 256-bit keys in Galois/Counter Mode).
What that means:
- 256-bit keys: 2^256 possible keys. Brute force would take billions of years with all computers on Earth.
- GCM mode: Provides both encryption and authentication. Prevents tampering.
- NIST-approved: Used by US government for TOP SECRET data.
- Industry standard: Banks, healthcare, military all use AES-256.
What Gets Encrypted?
Profile Data (at rest):
- Cookies and session tokens
- Local storage and IndexedDB
- Browsing history and bookmarks
- Form autofill data
- Extension data and settings
- Cache files
Credentials (at rest):
- Your account password (hashed with bcrypt + salt)
- API keys
- Proxy passwords
- Webhook secrets
Data in Transit (TLS 1.3):
- All API requests
- Dashboard access
- Profile synchronization
- Desktop app communication
Zero-Knowledge Architecture
We use zero-knowledge encryption for sensitive profile data.
How it works:
- Your password generates an encryption key (never leaves your device)
- Profile data encrypts locally with your key
- Encrypted data uploads to our servers
- We store encrypted blobs. We can't decrypt them.
- When you log in, your key decrypts your data
What this means:
- Multilogin employees can't access your profile data
- Law enforcement subpoenas get encrypted data (useless without your key)
- Server breach doesn't expose your data
- If you forget your password, your data is unrecoverable
⚠️ Password Recovery
We can't reset your password for you. If you forget it, your encrypted data is permanently lost. Use a password manager. Enable two-factor authentication as backup.
Encryption Key Management
Master Key: Derived from your password using PBKDF2 with 100,000 iterations and random salt.
Data Encryption Keys (DEKs): Unique 256-bit key for each profile. Encrypted with your master key.
Key Rotation: DEKs rotate automatically every 90 days. Old keys kept for 30 days to decrypt legacy data, then destroyed.
Hardware Security Modules (HSMs): Master keys stored in FIPS 140-2 Level 3 certified HSMs. Physical and logical security.
Data at Rest
All profile data encrypts before writing to disk.
Desktop App Storage:
Profiles stored locally on your machine. Encrypted with device-specific keys. Unauthorized users can't access your profiles even with physical access to your computer.
Cloud Storage:
Team plans sync profiles to cloud. Data encrypts client-side before upload. Server stores encrypted blobs in AWS S3 with server-side encryption (AES-256) as additional layer.
Database Encryption:
MySQL databases use Transparent Data Encryption (TDE). Sensitive fields (API keys, proxy passwords) get application-level encryption on top of TDE.
Data in Transit
All network communication uses TLS 1.3 with perfect forward secrecy.
Cipher Suites (in order of preference):
- TLS_AES_256_GCM_SHA384
- TLS_CHACHA20_POLY1305_SHA256
- TLS_AES_128_GCM_SHA256
Certificate Pinning: Desktop app pins our SSL certificate. Prevents man-in-the-middle attacks even if CAs are compromised.
HSTS: HTTP Strict Transport Security forces HTTPS. No downgrade attacks possible.
Backup Encryption
Profile backups (exported via dashboard or API) are encrypted archives.
Export Format: AES-256 encrypted ZIP with password protection.
Backup Storage: If you store backups in Dropbox/Google Drive, use their encryption features. Or encrypt with 7-Zip/VeraCrypt before uploading.
Encryption Performance
| Operation | Profile Size | Encryption Time | Overhead |
|---|---|---|---|
| Profile Save | 100MB | 1.2 seconds | ~5% |
| Profile Load | 100MB | 0.8 seconds | ~3% |
| Cloud Sync | 500MB | 8 seconds | ~10% |
| API Request | 1KB | <1ms | Negligible |
Encryption adds minimal overhead. Hardware AES acceleration (AES-NI on modern CPUs) makes it nearly free.
Compliance Certifications
- SOC 2 Type II: Annual audit of security controls
- GDPR Compliant: Data encryption required by Article 32
- CCPA Compliant: California privacy law requirements
- ISO 27001: Information security management (in progress)
What We Don't Encrypt
Some data can't be encrypted without breaking functionality:
- Usernames/Emails: Needed for login and search. Hashed for privacy.
- Profile Names: Must be searchable. Don't put sensitive info in names.
- Audit Log Metadata: Timestamps, actions, actors. Needed for security monitoring.
- Billing Info: Payment processor (Stripe) handles this. PCI DSS compliant.
Verifying Encryption
Check TLS Connection:
Visit multilogin.io → Click padlock in address bar → View certificate → Should show TLS 1.3 with AES-256-GCM cipher.
Check Profile Encryption:
Profile storage location → Open profile directory → Files are binary encrypted blobs, not readable text.
Dr. Emily Zhang
Chief Security Officer
Dr. Emily Zhang leads security at Multilogin.io. She holds a PhD in Cryptography from Stanford and previously secured systems at Signal and ProtonMail.