Security and Compliance
At Tailrec, security is at the core of everything we do. We implement industry-leading security practices to protect your data and ensure reliable tunnel connections.
Security Features
End-to-End Encryption
All tunnel traffic is encrypted using TLS 1.3, ensuring your data remains secure in transit.
Authentication & Authorization
Secure OAuth 2.0 authentication with support for Google and GitHub providers.
Infrastructure Security
Hosted on Google Cloud Platform with built-in DDoS protection and network isolation.
Data Encryption at Rest
All stored data is encrypted using AES-256 encryption with automatic key rotation.
Data Protection
We implement comprehensive measures to protect your data:
Minimal Data Collection: We only collect data necessary to provide our services. We do not access, modify, or use your tunnel traffic without explicit consent.
Data Isolation: Customer data is logically isolated using Firebase security rules and project-level segregation.
Secure Storage: All data is stored in Firestore with encryption at rest and regular automated backups.
Access Controls: Strict role-based access controls (RBAC) limit data access to authorized personnel only.
Audit Logging: Comprehensive logging of all system access and operations for security monitoring.
Network Security
Our tunnel infrastructure is built with security best practices:
WebSocket Security: All WebSocket connections use WSS (WebSocket Secure) protocol with TLS encryption.
Subdomain Isolation: Each tunnel runs on an isolated subdomain to prevent cross-tunnel interference.
Rate Limiting: Built-in rate limiting protects against abuse and ensures fair resource allocation.
DDoS Protection: Google Cloud Load Balancing provides automatic DDoS mitigation.
Network Monitoring: 24/7 monitoring of network traffic for suspicious activity.
Compliance
wsgrok is committed to meeting international compliance standards:
GDPR Compliance (EU)
We comply with the General Data Protection Regulation (GDPR) for European users, including rights to data access, portability, and deletion. Users can request their data or account deletion at any time.
CCPA Compliance (California)
We comply with the California Consumer Privacy Act (CCPA), providing California residents with rights to know what personal information is collected, delete personal information, and opt-out of data sales (we do not sell personal data).
SOC 2 Type II (In Progress)
We are working towards SOC 2 Type II certification to demonstrate our commitment to security, availability, and confidentiality.
Security Best Practices
We recommend the following security practices when using wsgrok:
Use unique, strong subdomains that are not easily guessable
Never expose sensitive development data through public tunnels
Implement authentication on your local services when exposing them via tunnels
Regularly rotate your authentication tokens and API keys
Monitor your tunnel traffic using our built-in inspection tools
Close tunnels when not actively in use
Incident Response
We maintain a comprehensive security incident response plan:
24/7 Monitoring: Our systems are monitored around the clock for security incidents.
Rapid Response: Security incidents are triaged and addressed immediately by our security team.
User Notification: Affected users are notified within 72 hours of any data breach, in compliance with GDPR requirements.
Post-Incident Analysis: We conduct thorough post-mortems to prevent future incidents.
Third-Party Security
We carefully vet all third-party services and conduct regular security assessments. Our infrastructure relies on:
Google Cloud Platform: ISO 27001, SOC 2/3, and PCI DSS certified infrastructure
Firebase/Firestore: Google-managed database with built-in security features
Stripe: PCI DSS Level 1 certified payment processing
GitHub/Google OAuth: Industry-standard authentication providers
Vulnerability Disclosure
We take security vulnerabilities seriously. If you discover a security issue, please report it responsibly:
Provide detailed information about the vulnerability and steps to reproduce
Allow us reasonable time to address the issue before public disclosure
We will acknowledge receipt within 24 hours and provide updates on remediation
Questions?
If you have questions about our security practices or compliance, please contact us at Loading...