Security

Responsible disclosure policy

Please report security vulnerabilities to ...

Personal security

  • A password manager is mandatory

  • Two-factor authentication is mandatory

  • Hardware security keys are mandatory for 2FA and as cryptographic keys storage

Infrastructure

Linode is used to host our services. Google is used as the identity provider to access Linode infrastructure. SSH access is not used for operations, only as a backup method for emergencies only, SSH keys are stored on hardware security keys only.

Kubernetes

We use Kubernetes to utilize our cloud resources. The control plane is managed by Linode.

Networking

Zero Trust security model is used for both the control plane and data plane. All the data transit through secured by TLS connections. Our service is protected by Cloudflare.

  • from your browser to Cloudflare network: public TLS certificates are issued by Cloudflare

  • from Cloudflare network to our network: Origin CA TLS certificates are issued by Cloudflare

  • internally Istio service mesh is used with strict mTLS authorization

reasonry is a document version control and collaboration system. Collaborate on changes to multiple documents, then review and merge changes into the current version.
terms · privacy · security © 2025 Reasonry