Security at TruePulse
Your trust is our foundation. We employ industry-leading security practices to protect your data and ensure the integrity of every vote.
How We Protect You
Security isn't an afterthought—it's built into every layer of our platform.
Encryption in Transit
All data transmitted between your device and our servers is encrypted using TLS 1.3, the latest and most secure transport protocol.
Encryption at Rest
Your data is encrypted at rest using AES-256, the same standard used by governments and financial institutions worldwide.
Secure Authentication
We support multi-factor authentication (MFA), secure password hashing with Argon2, and protection against brute-force attacks.
Anonymous Voting
Votes are cryptographically separated from user identities. Even we cannot link a specific vote to a specific user.
Fraud Prevention
Advanced algorithms detect and prevent vote manipulation, multiple accounts, and bot activity without compromising privacy.
Regular Audits
Our systems undergo regular security audits and penetration testing by independent third-party security firms.
Robust Infrastructure
TruePulse runs on Microsoft Azure, benefiting from world-class physical security, redundancy, and compliance certifications.
- Geographically distributed data centers
- Automatic failover and disaster recovery
- High availability architecture
- DDoS protection and Web Application Firewall
- Real-time threat monitoring and alerting
- Network isolation and private endpoints
Compliance & Certifications
We maintain rigorous compliance with industry standards and regulations.
SOC 2 Type II
CertifiedCertified for security, availability, and confidentiality controls
GDPR
CompliantFully compliant with European data protection regulations
CCPA
CompliantCompliant with California Consumer Privacy Act requirements
ISO 27001
In ProgressInformation security management certification
Bug Bounty Program
We believe in the power of the security community. Our bug bounty program rewards researchers who responsibly disclose security vulnerabilities.
In Scope
- • Authentication and session management
- • Vote manipulation vulnerabilities
- • Data exposure or leakage
- • Cross-site scripting (XSS)
- • SQL injection
- • API security issues
Out of Scope
- • Social engineering attacks
- • Denial of service (DoS/DDoS)
- • Physical security issues
- • Third-party services
Security Questions?
Our security team is here to help. Reach out with any concerns or inquiries.