🔐 Zero-knowledge encryption

Your master key is born in your browser.

We only store encrypted blobs.

Even we cannot decrypt your data.

Request early access

How encryption works

Your credentials are encrypted end-to-end. The server never sees plaintext.

1

Sign up

Your browser generates a 256-bit master key. It never leaves your device.

2

Hash to server

Only the SHA-256 fingerprint goes to us, for verification. We never see the key.

3

Key storage

The master key stays in your browser, encrypted with a password-derived key (PBKDF2, 600,000 iterations).

4

Save credentials

Your API keys are encrypted with AES-256-GCM using your master key before reaching our server.

5

MCP request

On each request, the master key is sent in a header. The server decrypts, forwards, forgets (<200ms).

Threat model

We openly state what our architecture protects against, and what it does not. Most vendors never tell you this.

🛡️

What we protect against

Database breach

If our server is compromised, attackers find only encrypted blobs with no key.

Insider access

The connectors.hu team cannot decrypt your data. Zero-knowledge by design.

Network interception

HTTPS plus client-side encryption. Two layers of protection.

⚠️

What we do not protect against

Compromised device

If malware is on your machine, the master key can be extracted. Use endpoint protection.

Lost key

If you lose your master key, we CANNOT recover it. This is the cost of zero-knowledge.

Infrastructure-level compromise

If an attacker gains root access to the Supabase infrastructure, runtime memory is accessible.

Our architecture is auditable. Request the technical documentation if you need it.

Compliance and data protection

EU data center

All data is stored in the Frankfurt region (eu-central-1).

GDPR-compatible

Data minimization: no personal data stored in plaintext beyond your email address.

SOC2-compatible architecture

Our architecture follows SOC2 principles. Formal audit planned.

Request early access

← Back to homepage