Security

Last updated: 2026-05-07

A short, honest summary of how PhenoTrack protects your data. This page reflects what is shipped today; planned work is called out as "planned" rather than dressed up as done.

Authentication

  • Email + password and Google Sign-In.
  • Brute-force protection: client-side lockout after repeated failed sign-in attempts.
  • We don't store your password on our servers — credential storage is handled by our authentication provider.

In transit

  • All network traffic is over HTTPS / TLS 1.2+.
  • Our edge layer provides TLS termination, WAF, and DDoS protection.

At rest

  • Cloud data is encrypted at rest.
  • Local database encryption is planned for a future release; the encryption key is already generated and held in the device's secure storage.
  • Photos are EXIF-stripped (GPS, device serial, software) before being saved or uploaded.

Authorisation

  • Each user can only read or write their own data. Cross-tenant reads are denied at the database layer.
  • Photo storage uses the same model — only the owner can read or write their own files.
  • Client integrity verification is planned (monitor mode first, then enforce).

Privacy

  • Crash reports and analytics are off by default and require explicit opt-in.
  • Account deletion (Settings → Delete account) is a hard delete: every copy of your data on our servers and on this device is wiped. There is no soft-delete or recovery window.
  • Data export (Settings → Export data) produces a JSON snapshot you can take with you.

Disclosing a vulnerability

If you find a security issue, please write to security@phenotrack.com before disclosing it publicly. We'll acknowledge within 72 hours.