We take a serious approach to protecting our users and their data. First, we use industry-standard methods such as TLS and end-to-end encryption for all communications and data centers with acknowledged certifications. All user data is encrypted at rest to prevent any compromises in case of stolen hardware.
We have a private bug bounty program managed by Intigriti where we continually leverage their community of more than 70,000 security professionals to probe for weaknesses in our product. We engage in regular penetration tests where a select group of their researchers is tasked with probing the product and given extra information about system architecture to increase the chance of them finding weaknesses. This provides our engineers with information about security issues from trusted sources which are contractually bound to report and secrecy, allowing us to find and fix any issues before they are exploited. When vulnerabilities in existing features are reported, we treat them as a possible breach and initiate our internal breach review process.
Finally, we use CloudFlare to protect against denial of service attacks and many types of suspicious/malicious requests and to give us added ability to block out traffic from harmful actors.