Comment by egberts1

2 days ago

Some basic questions from a cybersecurity vulnerability researcher:

- what kind of authentication protocol stack is used

- what algorithm is used for network protocol encryption (hash, block, encryption)

- is data centrally stored, if so, is it encrypted at rest? Key stays in phones?

- any accounting audit done? (Moot but just a check mark in a small-family-business-oriented checkbox)

Great pricing!!