Security Features
Magic is SOC-2 compliant
Request Anomaly Detection to block fraudulent login attempts
24/7 Network Traffic Monitoring
End-to-end TLS Data Encryption
Zero Knowledge Proofs to prove a user is authenticated without users needing to reveal any sensitive information
Read more
Security docs
Magic's Whitepaper
Delegated Key Management explained
Article from Placeholder, one of Magic's investors
Magic is SOC-2 compliant
Request Anomaly Detection to block fraudulent login attempts
24/7 Network Traffic Monitoring
End-to-end TLS Data Encryption
Zero Knowledge Proofs to prove a user is authenticated without users needing to reveal any sensitive information
Read more
Security docs
Magic's Whitepaper
Delegated Key Management explained
Article from Placeholder, one of Magic's investors
Updated on: 11 / 11 / 2020