Skip to main content

Data Safety in Indigo

Our Commitment to Security

Security First

High security standards are our top priority across all Indigo products. We implement paranoid-level security systems to ensure your data remains protected at all times.

Password Security Architecture

How We Protect Your Master Password

Your account password is never transmitted or stored in plain text. We use a multi-layer encryption approach:

Password encryption flow diagram showing the multi-step process from user input to final storage
Example Transformation

Using a sample password: Rlvy71kswtWMjxcEFsNS

  1. Original: Rlvy71kswtWMjxcEFsNS
  2. After MD5: 9f9173e04ab6a708adc7fad26897074
  3. After SHA-2: f2205505e129ce8ce5f22d524e56f2d4339bc8b312896480d5d6a55cae878de7

Password Best Practices

  • Minimum Length: 16 characters
  • Composition: Mix of numbers and letters
  • Complexity: Include both upper and lowercase letters

Account Data Protection

  1. First website login generates a unique session cookie
  2. Indigo securely captures the cookie
  3. Cookie is encrypted using AES cipher
  4. Encrypted data is stored in cloud storage
Database storage diagram showing how encrypted data is stored
About AES Encryption

AES (Advanced Encryption Standard) is approved by the NSA for top-secret information when used in an NSA-approved cryptographic module.

Data Retention Policy

When you stop using Indigo:

  • Your data is retained for 3 months after subscription termination
  • All data is completely purged after the retention period
  • You receive multiple email reminders before deletion

Data security - our top priority

Our team includes only experts in the field of software development. Some of them have more than 8 years of experience in web development and security of Internet banking systems.

Bank-Grade Security

We are superior in security to many financial institutions. If you trust your online bank to save your data, rest assured that we can do it even better.

Data Flow Overview

Complete data flow diagram showing how your data is stored in cloud storage

Continuous Protection

Your data security is maintained through:

  • Regular security audits
  • Continuous monitoring
  • Proactive threat detection
  • Immediate security patches
Remember

While we maintain the highest security standards, always follow security best practices:

  • Use strong, unique passwords
  • Enable two-factor authentication when available
  • Keep your master password private
  • Regularly update your security settings