Security
iMegha does not have access to your data. Your files and messages are encrypted before they leave your browser. All we ever see is encrypted gibberish. This isn't a policy we follow — it's how the system is built.
We Can't See Your Data
Your files and messages are locked in your browser before they ever reach the cloud. We never see the unlocked version. We don't have the keys to unlock them.
What you see
Your files, messages, photos, and conversations — exactly as you created them.
What iMegha sees
kX9#mQ!2&Lp...vR@nZ*dF3...hY7$wB...
Encrypted gibberish. iMegha cannot read it.
What can iMegha actually see about you?
Email: you@example.com. @iMTag: @yourname. Account type: Personal Cloud. Cloud region: U.S. East. A locked blob of data we can't open. That's it. Nothing about your clients, files, or messages.
Your Cloud Is Separate From Ours
Your data lives in a cloud account that you own — completely separate from our platform. Each user has their own isolated infrastructure. No one else's data is mixed with yours.
Our Platform
Handles login, friend connections, message routing. Cannot see your data.
Your Cloud
Stores all your files, messages, and profile. You own all of it.
You're Always In Control
Revoke access instantly
Remove someone's access to a shared file with one click. Their key is deleted — they can no longer view it.
Delete everything
Remove your cloud infrastructure and all your data is gone. iMegha only has your email — no content.
Export anytime
You own the cloud account. Export your data using standard tools whenever you want. No vendor lock-in.
Audit everything
Every share, view, and download is logged in your cloud. See who accessed what, when — from your own dashboard.
Native Compliance
Compliance isn't a feature we added — it's how the architecture works. When the server can't read your data, most regulations are satisfied by default.
Architecture Patent PendingGDPR
- Data residency: You choose your cloud region
- Right to deletion: Remove your cloud = all data gone
- Data portability: You own the account, export anytime
- Data minimization: Platform stores only routing info
CCPA
- Right to know: Audit trail in your cloud shows all access
- Right to delete: Remove your infrastructure, data gone
- No sale of data: We can't even read it
HIPAA
- Data never on third-party servers
- Encryption at rest & in transit
- Audit trail: Every share, view, download logged
- Access controls: Revoke sharing instantly
SOX / Financial
- Audit trail: Immutable access log in your cloud
- Data integrity: AES-256-GCM with authentication tags
- Access logging: Who accessed what, when
Don't Take Our Word For It
Log into your cloud console and look at your storage, database, and functions. It's all there — in your account, under your control. Browse the encrypted files. Check the access logs. Verify everything.
Honest limitations
No system is invulnerable. If someone compromises your password and has access to your browser while you're logged in, they can access your data. We mitigate this with strong password protection and encourage storing your 24-word recovery phrase offline. You can revoke all sessions by changing your password.
Want the Full Technical Details?
Encryption algorithms, key hierarchy, infrastructure architecture, threat model, and more.
Read the Technical Whitepaper