Security starts with transparency.
UnoLock is built on zero-knowledge, post-quantum encryption with a coercion-resistant architecture. Every design decision is documented, every threat modeled, and every control mapped to a real adversary. This hub is your central resource for understanding how we protect your data.
- Security Overview Architecture, encryption, and defensive design
- Threat Model Adversaries, assets, mitigations, and residual risks
- Technical Details Cryptographic internals and protocol specifications
- Transparency Openness about how UnoLock operates and what we can't see
- Vulnerability Policy How we handle vulnerability reports and coordinated disclosure
- Bug Bounty Rewards for responsible security research
- Client Source Access Download and verify the published source bundle against production