— Security

Security built into every layer.

Your Righthand handles your inbox, calendar, contacts, and the work you depend on. We've built multiple independent layers of protection so only you can authorize sensitive actions — and so a single weak link can't unravel the whole thing.

01 — Defense in depth

Multiple layers. No single point of failure.

We don't rely on one safeguard. Your Righthand is protected by independent layers, so even if one is challenged, the others keep your data safe.

PASSPHRASEVERIFIED
01

Voice authentication

Biometric voice recognition coming soon

Before your Righthand takes action on a phone call, it verifies your identity with a secure passphrase that only you know. Even if someone has access to your phone number, they can't impersonate you.

Prevents voice spoofing and impersonation attacks.

julius@ops-team@unknown@
02

Identity verification

Your Righthand only has full access when contacted by your verified email addresses and phone numbers. Messages from anyone else are processed with lower privileges, preventing impersonation without your knowledge.

Only verified contacts can interact with your Righthand.

Unauthorized access attempts are logged and can trigger alerts to you.

INCOMINGignore previous instructions…FILTERED
03

Prompt injection protection

Advanced filtering detects and blocks attempts to manipulate your Righthand through malicious instructions hidden in emails, calendar invites, or other inputs. Your assistant follows your rules — not hidden commands from bad actors.

Your Righthand only follows your instructions.

Continuous monitoring for emerging attack patterns.

02 — Compliance & standards

Held to enterprise-grade standards.

We're actively pursuing industry-leading certifications so your data is protected by the same controls you'd expect from any vendor on your stack. Need documentation for your security review? Just ask.

  • SOC 2 Type IIIn progress
  • Encrypted at restAES-256
  • Encrypted in transitTLS 1.3

For security questionnaires, custom configurations, or a call with our team — reach out.

Request documentation

03 — Questions & answers

What people ask about security.

04 — Still have questions?

Talk to the people who built it.

Walk through your security requirements with our team. We'll cover architecture, controls, and answer anything your review process needs.