🔒 256-bit AES Encryption 🔐 Zero-Knowledge Architecture 🇪🇺 GDPR Compliant

At Relica, security isn't an afterthought — it's the foundation of everything we build. Your data is encrypted before it ever leaves your device, and only you hold the key.

🔐 Zero-Knowledge Encryption

Relica uses a zero-knowledge architecture, which means your backup data is encrypted on your device before transmission. We never see, store, or have access to your encryption key. Even if our servers were compromised, your data would remain completely unreadable without your personal encryption key.

What this means for you: Only you can decrypt your backups. Not us, not anyone else. Your privacy is mathematically guaranteed.

Encryption Standards

🔒 Data at Rest

All backup data is encrypted using AES-256 encryption before leaving your device. This is the same standard used by governments and financial institutions worldwide.

🔒 Data in Transit

All communications between your device and our servers use TLS 1.2 or higher with modern cipher suites, ensuring your data cannot be intercepted.

🔐 Key Derivation

Your encryption key is derived from your password using industry-standard key derivation functions, making brute-force attacks computationally infeasible.

🛡 Authenticated Encryption

We use authenticated encryption modes that verify data integrity, ensuring your backups haven't been tampered with during storage or transmission.

Infrastructure Security

Multi-Cloud Redundancy

For Relica Cloud customers, your encrypted data is stored across multiple independent cloud providers. This multi-cloud approach ensures:

Data Center Security

Our infrastructure providers maintain strict physical and operational security controls including:

Application Security

Secure Authentication

Client Application

Privacy by Design

What We Cannot Access

What We Do Store

Ransomware Protection

🛡 Immutable Backups

Relica offers immutable backups that cannot be modified or deleted for a customer-defined retention period—even by administrators. This provides true protection against ransomware that targets backup systems.

Why this matters: Modern ransomware specifically targets backups to prevent recovery. Immutable storage ensures your backups remain intact and recoverable, even if attackers gain administrative access.

Compliance Support

Relica's architecture supports compliance with:

Note: Relica provides technical controls that support these frameworks. Customers are responsible for their own compliance programs and should consult with qualified compliance professionals.

Additional Compliance Features

Responsible Disclosure

We take security vulnerabilities seriously. If you discover a security issue, please report it responsibly:

We appreciate the security research community and will acknowledge valid reports.

Questions?

If you have questions about our security practices, please contact us:

Email: security@relicabackup.com
Support: support@relicabackup.com