Security

Built on the promise
we can't read your mail.

Zero-knowledge by design. Encrypted at rest. Auditable by you. This page is a plain-English explanation of how that works — with links to the cryptography underneath.

Zero-knowledge

Three layers, no plaintext.

Your mail provider hands us envelopes. We classify envelopes. Bodies stay encrypted under keys we cannot hold.

01 — Client

Your device wraps every key.

On install, your device generates an RSA-OAEP-4096 keypair. The private half never leaves. We only ever see the public half.

const keys = await crypto.subtle
  .generateKey(
    { name: "RSA-OAEP",
      modulusLength: 4096 },
    false, ["wrapKey"]);
02 — Envelope

Each message gets its own AES key.

A fresh AES-256-GCM key encrypts each message body in memory. That AES key is then RSA-wrapped with your public key before it touches disk.

03 — Glance

We see only headers.

Our servers handle From, To, Subject, routing metadata, and the wrapped ciphertext. No body, no attachments. Our ML reads envelopes — and never plaintext.


{ from_hash: "a1f9…",
  domain_age: 411d,
  dmarc: "fail",
  dkim: "none",
  body: <opaque ciphertext> }
Transparency · what a subpoena actually gets

If a court compelled us tomorrow, here's the honest answer.

We respond to lawful legal process. But we can only produce what we hold — and we do not hold plaintext.

The court order demandsWhat Glance can actually produce
Email body contentNothing readable — ciphertext only.
AttachmentsNothing readable — we never touch them.
Metadata / routingOnly what the SMTP header already reveals.
Sender identityA salted hash. The plaintext address lives with you.
Our ML inference signalsAggregated counts. No sender-level data beyond hashes.
Companion approval historyYes — with notice to the account holder, when law permits.
Compliance

Audited by people we don't employ.

We publish the reports. You read them. That's the deal.

Q1 2026

SOC 2 Type II

Continuous-window audit by an AICPA-accredited firm. Report available under NDA for teams; summary is public.

Download summary
On request

HIPAA BAA

Business Associate Agreement available for Pro customers handling PHI. Envelope-only architecture makes BAA scope trivial.

Request BAA
EU + California

GDPR & CCPA

Full data map published. One-click export, deletion, and correction requests. No dark patterns. No "sorry, 30 days."

View data map
Grade A+

SSL Labs A+

All endpoints score A+ on Qualys SSL Labs. HSTS preloaded. TLS 1.3 only. Cipher suites documented and pinned.

See report
Bug Bounty

We pay researchers who
find us wrong.

Scope: everything at glance.email, glance.app, and the mobile clients. We respond within 48 hours. No legal threats against good-faith reporters, ever.

Low severity

Information disclosure, CSRF, missing headers.

Reproducible, non-chained. Credited in the hall of fame.

$100
Medium severity

Authenticated account takeover, logic flaws.

Meaningful impact on a real customer. Bonus for clean PoC.

$500
High severity

Cryptographic break, plaintext exposure, RCE.

Anything that violates zero-knowledge. Our worst nightmare is your biggest payday.

$2,500
Commitment

If we're ever breached, you'll hear it from us within 72 hours.

Not when our lawyers finish drafting. Not when regulators require it. Within 72 hours of confirming any incident touching customer data, we publish a full post-mortem: what happened, what was exposed, what we're doing next. That's the commitment — signed into our articles of incorporation.

Window · 72 hoursSigned by · Founders, BoardSince · Company formation, 2025
Change Log

The last five security releases.

Cryptography changes, auth changes, and infrastructure changes that touch customer data. Nothing cosmetic.

2026-04-14v1.4.0Rotated signing keys across all regions; new HSM-backed root.See detail →
2026-03-02v1.3.2Companion SMS verification upgraded to short-lived HMAC tokens.See detail →
2026-02-18v1.3.0Envelope storage moved to customer-key-wrapped S3 with object lock.See detail →
2026-01-29v1.2.1Third-party SOC 2 Type II audit window closed; report pending.See detail →
2026-01-08v1.2.0RSA-OAEP-4096 keypair generation moved fully client-side.See detail →
FAQ

Questions we get from
people who care about this.

What does "zero-knowledge" actually mean?

It means the servers running Glance do not possess the keys required to decrypt message bodies. We designed the system so that even with full administrative access to our infrastructure — including physical access to disks and active memory dumps — an attacker cannot read customer email. The private halves of those keys live on your devices, wrapped by your OS keystore.

Do you sell anonymized data?

No. We don't sell data in any form — anonymized, aggregated, hashed, or otherwise. Our revenue comes exclusively from subscriptions. If that ever changes, you'll see it on this page first, with at least 30 days of notice.

Who owns my encryption keys?

You do. Your devices generate them, your devices hold the private halves, and your devices sign every decryption request. If you delete your account, we delete our copy of the public halves and you're back to being a stranger to us.

Can a rogue Glance employee read my email?

Architecturally, no — they don't have the keys. Operationally, we also run least-privilege access, mandatory MFA with hardware tokens, and quarterly access reviews. Every production access is logged to an append-only audit trail that's reviewed by an outside firm during the SOC 2 window.

Where is my data stored?

US customers: AWS us-east-1 and us-west-2, dual-region. EU customers: AWS eu-west-1 and eu-central-1, dual-region, with no US failover. You can pin your region at signup. Moving between regions is a deletion-plus-reimport, never a silent migration.

How long do you retain anything?

Envelopes are retained as long as your account is active, so Companion decisions can stick. Ciphertext bodies follow your provider's retention — we don't store them independently. Logs are retained for 90 days. Billing records follow US tax law (seven years, hashed identifiers only).

What happens to my data if I cancel?

30-day grace period during which you can export everything as a signed, portable bundle. After 30 days, full cryptographic erasure: your public keys are destroyed, all remaining ciphertext is unreadable forever, and the audit log of the deletion is preserved for one year for regulatory requests.

Do you respond to law enforcement?

We respond to valid, narrowly-scoped legal process from jurisdictions where we operate. We notify account holders whenever law permits. We challenge overly broad requests, and publish a transparency report twice a year listing request counts, rejection counts, and scope negotiations. What we produce is limited by the table above — we cannot hand over what we do not hold.

Why it matters

What no AI can do alone.

Trusted humans, not just trusted models.

A real person you love can sign off on the unfamiliar email. Apple Intelligence cannot do this. Abnormal cannot do this. Sublime cannot do this.

Your inbox, on your device.

Sub-50ms LightGBM + ONNX runs locally — no cloud round-trip. Zero-knowledge by architecture, not by promise. Even a subpoena gets nothing readable.

Stronger together.

Every approval makes the household — and the network — safer. Crowd-sourced reputation means a scam stopped for one family is stopped for thousands.

The security team

"Paranoid" is the compliment we accept.

If you read this whole page and still have questions, that's the right instinct. Ours, too. Reach out.