Skip to content

Security & Privacy

Flowsta Auth is designed so that even Flowsta staff cannot access user private data.

Security Architecture

LayerProtection
AuthenticationOAuth 2.0 + PKCE, no client secrets, CSRF protection
Data storageClient-side encryption, Holochain DHT
Key managementBIP39 recovery phrase, Ed25519 keypairs, PBKDF2 key derivation
SessionsShort-lived access tokens (1h), sliding refresh tokens (30d)
NetworkDistributed Holochain DHT, no single point of failure

Core Principles

Zero-Knowledge Privacy

Private user data (emails, recovery phrases, sessions) is encrypted client-side with keys derived from the user's password. Flowsta servers process encrypted data but never see the encryption keys or plaintext.

Zero-Knowledge Architecture - Detailed explanation

User-Owned Keys

Every user's identity is anchored to an Ed25519 keypair generated from a BIP39 recovery phrase. Users own their keys - Flowsta cannot revoke, modify, or access them.

No Client Secrets

Flowsta uses PKCE (Proof Key for Code Exchange) instead of client secrets. This is equally secure and works safely in browsers and mobile apps without exposing secrets.

Data Portability

Users can export their Holochain source chain and access their cryptographic keys at any time through Flowsta Vault.

Data Portability - How users access their data

For Developers

Next Steps

Documentation licensed under CC BY-SA 4.0.