How Your Data Integrity Is Protected
A summary of all the layers Borderly uses to protect the integrity and security of your records.
Everyone
Multiple Layers of Protection
Borderly uses several complementary technologies to protect your data:
- Encryption in transit — All data sent between your device and Borderly's servers is encrypted using TLS (the same technology banks use).
- Encryption at rest — Your evidence files are encrypted when stored in the cloud.
- SHA-256 hash chain — Every record is cryptographically linked to the previous one, making tampering detectable.
- Trusted timestamps (Certify tier) — Independent, third-party proof of when each record was created.
- Blockchain anchoring (Certify tier) — A public, permanent record of your data's integrity.
- Access audit trail — Access to your data is logged, so you always know who viewed what.
You Don't Have to Trust Borderly
The design of Borderly's security means you do not have to take our word for it. Your hash chain can be independently verified. On the Certify tier, every record receives an RFC 3161 timestamp and blockchain anchor. You can access and share the full proof data — including timestamp tokens and blockchain transaction references — so any auditor or tax authority can verify your records without trusting Borderly at all.
Didn't find what you need?
Contact support