Trust Center
Security, transparency, and operational readiness
This hub centralizes disclosures, security practices, and verification links so your reviewers can complete diligence without waiting for email threads.
Security posture
Encryption in transit and at rest, PBKDF2-based key derivation, and smart contract enforced unlock windows.
Identity
Wallet-sign flows and passphrase shards reduce reliance on email resets or single admin accounts.
Monitoring
Integrity beacons every five minutes, webhook alerts, and SOC dashboards for incident triage.
Data handling
Client-side encryption by default, IPFS pinning across regions, and no server-side key custody.
Responsible disclosure
Coordinated response window
Report suspected vulnerabilities privately to support@usetala.in. Include reproduction steps, potential impact, and preferred contact method.
We aim to acknowledge within 48 hours and share mitigation timelines within 7 business days for high severity issues.
Do not post proofs publicly until a fix is confirmed or a coordinated date is agreed.
PGP
Request the security key via support@usetala.in
Timeline
Acknowledge 48h, remediation plan 7d, fix priority by severity
Artifacts
Verified references
Security.txt
Open the latest version
Smart contract audits
Open the latest version
Architecture overview
Open the latest version
API documentation
Open the latest version
Data locations
Primary compute and storage operate in India. IPFS pinning uses multiple regional partners to improve durability. No plaintext material is stored server side.
On request, we can share region lists and gateway partners for your review.
Access controls
Least-privilege IAM, hardware backed admin keys, and mandatory reviewer approval for production access.
Compliance posture
- •Audit cadence: Independent reviews scheduled quarterly.
- •Data residency: Primary storage in India with regional IPFS partners.
- •Availability: 99.9 percent target uptime with status reporting.
- •Disclosure: Coordinated vulnerability reporting through support@usetala.in.
Incident response
Critical events trigger immediate isolation, log capture, and stakeholder notification. Post-incident reports summarize impact, timeline, and mitigations.
View status and historyReach the team
support@usetala.in