Peerio aims to provide ambitious security assurances. As a result, we want to be as open and transparent as possible about our technology and how your data is handled when using Peerio Services. The Peerio app is open source and our client source code is publicly available for review on GitHub.
Philosophically, Peerio endeavors to collect, use and disclose the minimum amount of personal information that is necessary to operate the Services.
If you have any other questions, please contact us at email@example.com
Peerio provides message sharing, file sharing, and cloud storage with end-to-end encryption that makes your data inaccessible to anyone other than you and your intended recipient(s), even Peerio cannot access the contents of your messages and files. The confidentiality, integrity and authenticity of the ciphertext (your encrypted data) is designed to be protected by Peerio against:
Server compromise — If Peerio's server network is ever compromised, the content of your messages and files will remain inaccessible to any third party, including Peerio and its employees.
Malicious Host — The Peerio app protects against message forgery, file modification, and artificial read receipts of messages that have not been read.
Man-in-the-middle attacks — The Peerio app provides means for users to securely authenticate each other’s cryptographic identities (see “avatars” and “Peerio Public Key”).
Unauthorized account access — Peerio protects a user’s account and identity by using authentication challenges, including a passphrase, device specific passcodes, and optional two-factor authentication (2FA).
Peerio does not anonymize connections, geolocation, or the identity of users. Peerio is compatible with certain anonymizing software, however we cannot recommend or guarantee any claims such tools may make. We can only provide assurances about the things we control.
Peerio cannot protect against key-loggers or other similar malware and backdoors that may exist on a user’s machine. It is the user’s responsibility to ensure their device is free of such software.
Peerio cannot protect you from passphrase mismanagement, such as telling others your passphrase or storing your passphrase in an insecure location.
Peerio cannot protect you from environmental concerns, such as leaving your device unattended with Peerio open or people looking over your shoulder.
Peerio offers a passcode feature that allows device-specific passwords. It should be noted that passcodes store an encrypted copy of the passphrase on the device where they are configured, and thus are more vulnerable if the device itself is stolen and compromised. For this reason, passcodes should only be used on trusted, well-protected devices.
Peerio uses state-of-the-art encryption to offer high security standards in an intuitive, easy-to-use application.
Peerio leverages the *nacl* cryptographic framework, which itself uses the following cryptographic primitives:
- X25519 for public key agreement over elliptic curves.
- ed25519 for public key signatures.
- XSalsa20 for encryption and confidentiality.
- Poly1305 for ensuring the integrity of encrypted data.
Additionally, Peerio uses scrypt for memory-hard key derivation and BLAKE2s is used for various hashing operations.
For in-transit encryption, Peerio Services use Transport Layer Security (TLS) with best-practice cipher suite configuration, including support for perfect forward secrecy (PFS). You can view a detailed and up-to-date independent review of Peerio’s TLS configuration on SSL Labs.
The Peerio network manages public key exchange and verification, while also offering users independent out-of-band public key authentication. When you sign up for Peerio, you are assigned a randomly generated passphrase (known as the Account Key). This is then used to derive your unique private encryption keys, from which public keys assigned to your account are then derived. You can independently verify a user’s cryptographic identity via their public keys, or shorter Peerio ID#.
Peerio’s client code is open source to provide transparency and strengthen Peerio’s security through ongoing public review, testing, and evaluation. Peerio’s client code is available for review on GitHub.
To encourage community peer review and security research, Peerio offers a Bug Bounty of up to $5000 for anyone able to successfully identify a critical security vulnerability in Peerio.
Peerio’s bug bounty operates with a policy of responsible disclosure. Bug reports must not publicly disclose a security vulnerability before allowing Peerio a reasonable amount of time to address the issue. This policy also holds us responsible for swiftly fixing ‘high’ or ‘critical’ vulnerabilities that affect user security, and disclosing reported bugs and fixes within a reasonable amount of time.
To ensure Peerio’s security in its most recent iteration keeps pace with contemporary technological standards, Peerio’s client and server code undergo an independent third-party security audit at least once every six months.
Peerio was last audited in March of 2017 by expert cryptographers and penetration testers at Cure53.
All our employees undergo security training for in-office procedures, online practices, and responding to attempts to obtain data through phishing or other forms of social engineering.
Access to information and operational structures, including user data, servers, and support services, is regulated to as few employees as is necessary to provide you with Peerio services.
We retain only basic information needed to provide Peerio services to users and to improve Peerio’s operations. More information about this is provided below.
When you sign up for the Peerio App, we collect the information you provided to open your account, including your username, first and last name (legal name not required), and contact information such as email addresses or phone numbers (optional). This information is used to help you connect with your contacts on Peerio, send you important updates about your account, and to offer support with account services.
When you invite your contacts to join Peerio with the "Add Contacts" or "Import Contacts" feature, you provide us with the email addresses and/or phone numbers of your contacts. This information will be used only to send the invitation you have requested via email or SMS. We will not use this information for any other purpose. If your contact does not register for Peerio, their contact information will be securely removed automatically after ninety (90) days. If the contact does join Peerio, they will receive a contact request from your Peerio account.
When you send messages to our support team, your email will be filed for follow-up correspondence, and any information you directly provide in your support request will be used to assist you in your support request. Please do not send any sensitive information through our support center, such as your Peerio passphrase, passcode, credit card or other payment information.
Peerio has access to the ciphertext (encrypted data) of messages and files you share or upload. The contents of this encrypted data can only be read by a user and their intended recipients, and cannot be read by Peerio or any other third parties. Peerio has access to ciphertext only for the purposes of delivering, receiving, and/or storing users’ encrypted messages and files. We cannot decrypt this ciphertext and we (and teams of independent auditors) believe that it is resistant to highly sophisticated attacks.
Some metadata of Peerio messages is accessible by Peerio’s servers and needed in order to provide services. This includes, the sender’s and recipient(s)’ usernames and public keys; the time at which messages and files are sent and received; the size of files uploaded to Peerio; the message ID that a file is attached to; and a user's Peerio contacts’ usernames and public keys.
Peerio has access to your Peerio account settings and information, such as language preferences, notification settings, storage usage information, logs of authentication errors, timestamps of server requests, and users’ sent, received, and rejected contact requests.
The Peerio App and website are able to identify a user's IP address, which can be used to determine user connections, geolocation, and identities.
Peerio collects IP address information to connect to our data centers, as well as help users review connection attempts, and identify any possible suspicious activity with their account in order to protect Peerio and its users.
IP address information may also be used to protect users’ ability to connect to Peerio network by identifying and preventing attacks on the Peerio server network.
Peerio clients for mobile devices offer optional crash and exception reports. You have the choice of whether to submit such a report to Peerio, and reporting is disabled by default. These reports are completely anonymous and are used to help Peerio improve services and support for Peerio’s mobile and desktop clients. Crash and exception reports will include the device platform, device type, device model, operating system version, Peerio client version, stack track, and the exception name and type.
Users are able to opt-in for anonymous non-content data collection that aids Peerio's ongoing usability research and design work. This option is off by default and can be enabled or disabled by the user at any time through their account settings. If enabled, the user agrees to allow the Peerio client to collect non-identifying and non-content data; such as the amount of time spent on a given page or between actions, or which actions are taken or not taken on a page. Data collected in this way is stored on Peerio-hosted servers. This data will never be sold to third parties. Peerio may choose to share this data with other researchers free of charge in the pursuit of improving public knowledge on issues related to security and design.
We do not sell, trade, or rent any user information to any third parties. There are limited situations in which Peerio will share user data in order to provide our services. These include:
Peerio support services
When you make an emailed request to Peerio support, your email as well as the content of your request will be available to our support services provider.
Email and SMS notifications and invitations
Your email and/or phone number will be shared with the message service we use to deliver such notifications. Such messages cannot be delivered without communicating such information to the message services provider. Notifications are used to deliver Peerio confirmation codes, invitations to contacts, and (optionally) notices about the number of new messages or contact requests you may have. No Peerio message or file content is ever shared. This information will not be used for any purpose other than message delivery.
When you send an invitation to one of your contacts, the message will include the name you have registered with Peerio as well as your Peerio username. This is to inform your contacts of who is inviting them and how to connect with you on Peerio. You control what information you provide to Peerio for such purposes.
All payments made to Peerio, along with payment information (date, amount, sender, recipient, etc) are shared with and processed through a third party payment service. Peerio does not host any payment information.
You may delete your Peerio account at any time, for any reason. However, to prevent third-party requests to delete user data, Peerio cannot delete your account for you.
Any data that is owned only by you and has not been shared with other users will be removed completely from Peerio’s servers and network.
Data that has not been destroyed and has been shared with other users will remain on the Peerio network until all users with whom it has been shared have destroyed the data in question.
Peerio retains user data only as long is necessary to provide Peerio’s services to users. While your account is registered and in use, this includes the data Peerio has access to, as outlined above. Activity logs are securely wiped after 30 days.
If you delete a message or a file that you have previously shared, it will not be removed from our servers until all recipients have also removed it from their account(s), at which point the message or file and its metadata will be securely wiped within 24 hours. If you delete a message or file that you have not shared with anyone, that data and associated metadata will be securely wiped from Peerio’s servers within 24 hours.
If you destroy a file, it will be removed from Peerio’s servers, network, and all users immediately. However, we cannot destroy evidence that a file with a particular encrypted file ID was once sent in a message. The message it was sent in will have a trace of this ID, as it is in the encrypted body of the message. Because it is encrypted, we are unable to remove it from such messages. This allows the Peerio app to verify that files the server has sent with a message were put there by the designated sender, and not a third party. Peerio cannot read the plaintext name of the file.
Upon account deletion, Peerio removes all your data from our servers and network, except for your account username, your Peerio public keys, and any messages and files you have shared with other users that you have not destroyed. This information is necessary for your former contacts to be able to identify and decrypt messages they have received from you. This information also helps us prevent attempts to create fraudulent accounts representing a previous user.
The Peerio Service runs on servers operated by our contractors and those servers may be located outside of Canada.
Information related to users you have invited to join Peerio, but who have not subsequently created an account with Peerio, will be removed after ninety (90) days. This time is solely used to help deliver contact requests and referral rewards to you and your contacts and will never be used for any other purpose.
We recognize that law enforcement agencies may make legitimate requests for user data from Peerio. Peerio is located in Quebec, Canada and all of our information systems are managed from Canada. We are of the view that we can only be compelled to provide information to third parties according to the federal laws of Canada and the provincial laws in Quebec. We are also of the view that we can only be compelled to provide the limited user information we have according to the federal laws of Canada and the provincial laws in Quebec. We will only provide user information to a third party where we are of the view that we are compelled to do so by applicable legal process.
Law enforcement agencies outside of Canada should use letters rogatory or procedures established under any applicable Mutual Legal Assistance treaty.
Users will be notified if a request has been made to provide their data to a law enforcement agency, unless Peerio is legally unable to do so.
Any law enforcement request can only retrieve, as a maximum, information available to Peerio. As Peerio does not handle users private encryption keys, Peerio cannot provide law enforcement agencies with plaintext or unencrypted messages or files a user may have uploaded, downloaded, sent, or received in Peerio. However, certain metadata may be subject to seizure – see above, “What Information Peerio Has Access to”.
Please view our Law Enforcement Guidelines for full details.
Peerio does not have access to any information that would identify a user's age, nor do we retain any information that might be able to do so. However, Peerio is not intended to be used by children or persons who are not capable of entering into a legally binding contract between themselves and Peerio. Any person who is under the age of majority in the jurisdiction in which they reside must obtain the consent of their legal guardian to create a Peerio account and to consent on their behalf to this Policy.