Security & Compliance

Cryptographic proofs,
not pinky promises.

Kataloop is built on zero-trust architecture where anonymity isn't a feature. It's the foundation. Even malicious insiders or compromised databases can't reveal who said what.

How We Protect Your Data

Kataloop is built on a zero-trust architecture where anonymity isn't a feature. It's the foundation.

Zero-Knowledge Anonymity

We mathematically cannot identify who said what. Not "we promise not to look". We literally cannot.

  • Cryptographic hashing with company-specific salts
  • Participant IDs (PIDs) are one-way hashes
  • No reverse lookup possible, even with database access
  • Anonymous at the protocol level, not policy level

Data Minimization

We don't collect what we don't need. Period.

  • No PII stored in feedback tables
  • Pseudonyms computed on-the-fly, never stored
  • No link between auth layer and feedback layer
  • Audio transcripts deleted after processing

Infrastructure Security

Enterprise-grade cloud infrastructure with defense-in-depth.

  • SOC 2-compliant hosting providers
  • Encrypted at rest (AES-256) and in transit (TLS 1.3)
  • Security-first development practices
  • DDoS protection and WAF

Audit Trails & Logging

Complete visibility into system access and changes.

  • Immutable audit logs for all admin actions
  • Real-time alerting for suspicious activity
  • Quarterly security reviews
  • Comprehensive access logging

What We DON'T Collect

Unlike "anonymous" survey tools that still track IP addresses, device fingerprints, and metadata:

No IP address logging
No device fingerprinting
No location tracking
No browser metadata
No timing correlation analysis
No keystroke patterns
No cookie tracking
No third-party analytics

Zero-Knowledge Architecture

Most "anonymous feedback tools" rely on organizational policy. We rely on mathematics.

The Problem With Traditional Surveys

Traditional anonymous surveys store responses with metadata that makes re-identification possible:

  • Timestamps (who was online at 3:47 AM?)
  • IP addresses (traced to office locations)
  • Browser fingerprints (unique to each device)
  • Writing style (linguistic fingerprinting)

Our Solution: Mathematical Anonymity

Irreversible Hashing

Your identity is transformed through one-way cryptographic hashing. There is no key. There is no way back. Even we cannot reverse it.

K-Anonymity Thresholds

Patterns only surface when enough people share them. Dynamic thresholds adjust to team size: 20% for small teams, 5% for large orgs.

Topic-Sensitive Thresholds

Sensitive topics (safety concerns, harassment, power dynamics) surface faster because waiting for 5 voices could mean waiting too long for critical issues.

STANDARD
5+ voices
Process, tools, collaboration
SENSITIVE
3+ voices
Culture, power, autonomy
CRITICAL
2+ voices
Safety, harassment, ethics

Users receive a clear warning before submitting sensitive topics: yellow for sensitive, red with confirmation for critical. This ensures informed consent while prioritizing safety.

L-Diversity (l≥3)

Each anonymity group needs diverse feedback types. Prevents "all negative = that person."

NER Detection

AI scans for self-identifying info before storage. Names, projects, unique details, all caught.

Compliance & Certifications

Enterprise-grade compliance for organizations that take security seriously.

SOC 2 Type II
Planned
ISO 27001
Roadmap
GDPR Compliant
By Design
End-to-End Encryption
Standard

GDPR Compliance

Data minimization by design
Purpose limitation enforced
Right to erasure (Article 17)
Data portability (Article 20)
Processing without identification (Article 11)
EU data residency options

Data Protection

How we protect your data at every layer of the stack.

Encryption at Rest

All data encrypted with AES-256. Database-level encryption with key rotation. Backup encryption with separate keys.

Encryption in Transit

TLS 1.3 for all connections. HSTS and secure headers enforced. Perfect forward secrecy enabled.

Infrastructure

SOC 2 compliant cloud providers. Multi-region redundancy. Automated security patching. WAF and DDoS protection.

Access Control

Role-based access with least privilege. MFA required. Session management with automatic timeout. Audit logging.

Future: Personal Development Data

When personal development features launch, they will have a separate, even stronger privacy model:

You own your development data, not company property
Manager access requires explicit opt-in
Never used in performance reviews
Full export and delete rights

Still have security questions?

Our security team is available for detailed technical discussions, architecture reviews, and custom compliance assessments.