Our teams are dedicated to making your service as efficient, safe, and secure as possible. If you're curious how Shadow protects your data, read this article for answers to the following questions:
- What are Shadow's protection protocols today?
- How does Shadow protect its data centers?
- Can Shadow guarantee any protection against hacking?
- Can you see what I'm doing on Shadow?
- Where is my data stored?
- Can I permanently delete all my stored data?
What are Shadow's protection protocols today?
Although Shadows are hosted on high-security data centers, there are two additional features that make Shadow's security unique:
- An IP address filtering system
- A proprietary protocol for Blade called the "SUFP"
Even if an individual with ill intentions was able to steal data, he would then have the additional challenge of "interpreting" this data in order to use them.
We've also created what users may consider a "tunnel" between the data center and your Shadow, similar to a VPN (Virtual Private Network). This gives Shadow the ability to offer secure browsing, adding another layer of protection when accessing confidential data such as your banking information or your passwords.
Shadow will eventually create a single-key encryption channel each time you log in. With this new system, your data will be encrypted with an SSL certificate.
How does Shadow protect its data centers?
Because Shadows are hosted in data centers, we have network and infrastructure professionals on standby. Our professionals have better tools and provide increased protection compared to the average home PC.
In the case of an attempt to hack into our data centers, the intruder will have to go through our multiple firewalls and will be detected by Blade. This alerts our teams, who will then take the next necessary steps.
Additionally, thanks to our IP address filtering system, they would have to target a specific Shadow which makes the task much more difficult for a potential intruder.
Can Shadow guarantee any protection against hacking?
Each user has their own environment, isolated from other users, with their own dedicated hardware and resources. This minimizes any chance of your data leaking to another account, or a user gaining access to your data using their own Shadow.
In addition, your Shadow runs on servers located in Europe and the United States, managed 24/7 by a dedicated team and secured with the same technologies as those used by banks. Our data centers also have effective cyberattack protections, including firewalls against DDOS attacks.
Your data is much better protected in our data centers than a PC at home.
Can you see what I'm doing on Shadow?
Only users have access to their Shadow and they alone know what is stored. Our systems will monitor the use of your hardware to control temperatures and power consumption.
Where is my data stored?
Your Shadow is located in a secure data center closest to the service address provided upon purchase, in Europe or the United States.
Shadow is subject to regulations on data protection in France or California (US), depending on the location of the customer's service.
Can I permanently delete all my stored data?
Yes, just as you would on your own computer or device.
To reset Shadow back to its factory settings, but keep your account, see how to reset your Shadow.
If you've terminated your subscription and would like to delete your account, see how to delete your personal data.
💬 Note: We do not have the ability to recover your data if it has already been deleted, but we will consider new data features as needs arise.
If your security question was not answered in this article, use your account page to contact Support for assistance.
If you do not have an account, submit a request.