Threat model
What we defend against.
Insider threat
Database admins see ciphertext. PHI keys never live on our servers. The audit log records every query.
Server compromise
Attacker gets ciphertext. Keys live on patient devices. Chain logs every access attempt — including failed ones.
Government request
Records produced only via patient-issued grant tokens. Subpoenas land on the patient's inbox, not ours, by design.
Supply chain
Pinned dependencies. Reviewed updates. Vendored builds for critical services.