Skip to main content

Security at Tether

Your data security is a core priority. We build on trusted, certified infrastructure and follow security best practices to keep your information safe.

Last updated:

How We Protect Your Data

Encryption

Data encrypted in transit via TLS. Sensitive credentials encrypted at rest with AES-256-GCM.

Secure Infrastructure

Your data is hosted on Supabase and Vercel, both of which maintain SOC 2 Type II certified infrastructure.

Access Controls

Session-based authentication, API key hashing, and OAuth 2.0 with PKCE for third-party integrations.

Server-Side Authorization

All data access flows through authenticated server-side code with authorization checks. Direct database queries from clients are blocked.

Input Validation

Server-side input validation with Zod schemas and request guards across all API endpoints.

Webhook Verification

Stripe webhook signatures are cryptographically verified before processing any payment events.

Infrastructure Security

Tether is built on infrastructure providers that maintain rigorous security certifications and practices:

  • Supabase (database and authentication): SOC 2 Type II certified. Provides encrypted storage, network isolation, and managed authentication services.
  • Vercel (application hosting): SOC 2 Type II certified. Provides DDoS protection, edge network security, HTTPS enforcement, and HSTS.
  • Stripe (payment processing): PCI DSS Level 1 certified. Payment card data is handled entirely by Stripe and never touches our servers.
  • Resend (transactional email): Handles delivery of transactional and notification emails.
  • Customer.io (customer messaging): Powers customer messaging and campaign automation workflows.

By building on these certified platforms, Tether benefits from enterprise-grade physical security, redundant infrastructure, and continuous monitoring maintained by dedicated security teams at each provider.

Data Encryption

Encryption in Transit

All traffic between your browser and Tether is served over HTTPS. Connections to our database use encrypted channels to protect data in transit.

Encryption at Rest

Sensitive credentials, such as third-party integration tokens, are encrypted at the application level using AES-256-GCM before being stored. Our database provider also encrypts data at rest at the infrastructure level.

Database Security

Our database infrastructure provides encrypted connections and network isolation. All data access in production is routed through the application layer, preventing direct client-side database access.

Authentication & Access

User Authentication

Users can sign in with email and password or passwordless magic links. Sessions are managed via secure, HTTP-only cookies and are automatically refreshed on each request.

API Key Security

API keys are generated with cryptographically random secrets. The full key is shown once at creation; only a SHA-256 hash is stored in our database. Keys can be revoked at any time from your dashboard.

OAuth 2.0 with PKCE

Third-party integrations authenticate via OAuth 2.0 with PKCE (RFC 7636). Authorization codes and access tokens have short expiry windows, and all tokens are stored as SHA-256 hashes.

API & Application Security

Input Validation

All API endpoints validate input using server-side schemas and guard functions. This protects against injection attacks and malformed data.

CORS

Internal API routes use restricted CORS policies, allowing only specific known origins. Public-facing endpoints have broader access as required by their protocols.

Rate Limiting

Rate limiting is applied to public-facing endpoints to prevent abuse, with per-endpoint and per-user limits.

Webhook Verification

Incoming payment webhooks are verified using cryptographic signature checks before any event is processed, preventing spoofed or tampered payloads.

Data Handling & Privacy

Data Collection

We collect information necessary to provide our services: account details, customer data you choose to track, and usage information. We do not sell your data to third parties.

Data Isolation

Customer data is scoped by product and user identifiers in our data model. All queries are filtered through server-side authorization to ensure you only access your own data.

Data Retention & Deletion

We retain your data only as long as necessary to provide our services. When you delete your account, we permanently remove your data from our systems within 30 days. For full retention details, see our Privacy Policy.

Logging & Observability

All operations executed through our API layer are logged with the user ID, operation name, source, and authentication type. Rate limit violations and access anomalies are also captured for review.

Privacy & Compliance

Tether is committed to respecting user privacy and meeting applicable data protection requirements:

Privacy Policy

Our Privacy Policy details our data collection, processing, legal bases, and your rights under GDPR, CCPA, and other applicable laws.

Data Processing Roles

We act as a data processor for your customer data and a data controller for your account data. Data Processing Agreements are available upon request.

Infrastructure Certifications

Our infrastructure providers (Supabase, Vercel) maintain SOC 2 Type II certifications. Tether itself does not currently hold an independent SOC 2 certification.

Sub-Processors

We disclose all sub-processors in our Privacy Policy. Currently: Supabase, Vercel, Stripe, Anthropic, Resend, and Customer.io.

Incident Response

In the event of a security incident affecting customer data, we will:

  • Investigate and contain the incident promptly
  • Notify affected customers without undue delay
  • Provide clear information about the nature and scope of the incident
  • Take corrective steps to prevent recurrence
  • Comply with all applicable breach notification laws (including the 72-hour GDPR notification requirement where applicable)

Security Best Practices for Users

While we implement the security measures described above, your security also depends on your practices:

  • Use a strong, unique password for your Tether account
  • Keep your API keys and OAuth tokens secure; rotate them if compromised
  • Be cautious of phishing attempts—we'll never ask for your password via email
  • Review your account activity regularly for any suspicious behavior
  • Log out of Tether when using shared computers
  • Report any security concerns immediately

Report a Vulnerability

If you discover a security vulnerability in Tether, we encourage responsible disclosure. Please report it to us so we can investigate and address it promptly.

We take all security reports seriously and will respond as quickly as possible. Please allow us reasonable time to investigate and address any reported vulnerability before disclosing it publicly.