Response Cycle
- Detection: Automated anomalies in relay traffic or reports from our Bug Bounty program.
- Containment: Isolate affected relay nodes; rotate infrastructure keys; pause specific API endpoints if necessary.
- Eradication: Patch vulnerabilities; purge any potentially tainted temporary caches.
- Recovery: Redeploy clean node images; restore service continuity.
Customer Notification
- Severity 1 (Data Breach): Notified within 72 hours via in-app alert and email (if provided). Note: Since we store no message data, a "breach" is typically limited to metadata or service disruption.
- Severity 2 (Service Degradation): Updated via our Status Page.
Preparedness
We conduct quarterly tabletop exercises simulating scenarios such as "Relay Node Compromise" and "ZKP Circuit Vulnerability" to ensure our team is battle-ready.

