logoalt Hacker News

egberts1today at 12:35 PM0 repliesview on HN

Some basic questions from a cybersecurity vulnerability researcher:

- what kind of authentication protocol stack is used

- what algorithm is used for network protocol encryption (hash, block, encryption)

- is data centrally stored, if so, is it encrypted at rest? Key stays in phones?

- any accounting audit done? (Moot but just a check mark in a small-family-business-oriented checkbox)

Great pricing!!