Developed with Modern Security in Mind
Tanka is built on industry best practices and security models, including the principle of least privilege, defense in depth, and the Secure Development Lifecycle (SDL) approach.
Robust Data Protection
Security Infrastructure
Security Infrastructure
Tanka's infrastructure is designed with multiple layers of protection (defense in depth) to safeguard your data during transmission, storage, and processing. This includes encryption, least-privilege access, and secure software development practices.
Product Security
Product Security
Our product and engineering teams are experts in a wide range of cybersecurity disciplines, ensuring that Tanka is built and maintained with the highest integrity and security standards.
Encryption at Every Level
Encryption at Every Level
All data is encrypted at rest using AES-256 and in transit using TLS 1.2+. We also implement controls to minimize the risk of data exfiltration.
Data Isolation
Data Isolation
Your data is yours alone. We enforce strict access controls, and data from different users and organizations is kept completely separate.
Zero Data Retention by Third-Party LLMs
Zero Data Retention by Third-Party LLMs
Your data is never used to train or retained by external, third-party Large Language Models.
Operational Security
Operational Security
Our cybersecurity team continuously monitors Tanka for any suspicious activity and implements new security controls as needed.
Report Security Findings
We take security seriously. If you discover a potential vulnerability, please email us at . We also welcome any questions about Tanka's security practices.
FAQ
Does Tanka train its model on our data?Tanka
Can other Tanka clients access our data?Tanka
A Messenger with Memory for Team Collaboration
Tanka