Data Securityat

At, we prioritize the security and privacy of our users' data. We understand the importance of safeguarding your information, and we have implemented best practices to ensure your data remains secure while using our platform.

Try Junia for free

YOUR DATA, YOUR CONTROL is designed to empower you with control over your data, ensuring that you retain ownership and authority.

Technology Overview offers a suite of AI-powered tools and services for content creation, editing, and optimization, designed with modern programming languages, frameworks, and orchestration platforms. Our platform is hosted on secure data centers operated by industry-leading providers. Personal data processing is minimized in our systems, and we have GDPR-compliant Data Processing Agreements and Privacy Policies in place.

Data Encryption leverages the robust security features of Supabase and Postgres to protect your data.

  • In Transit: All data transferred between your device and our servers is encrypted using Transport Layer Security (TLS) technology, ensuring secure communication.

  • At Rest: Supabase uses PostgreSQL for data storage, which supports Transparent Data Encryption (TDE) to encrypt data at rest. This provides a high level of security to protect your stored data.

By utilizing these security features, we ensure that your data remains secure both while in transit and at rest.

Application Security web services utilize passwordless authentication methods to enhance security and streamline the user experience. Our platform supports the following authentication methods:

  • Google Login: Users can securely log in using their Google accounts, leveraging Google's robust security infrastructure.

  • Email Magic Link Login: Users can receive a unique, time-sensitive magic link sent directly to their registered email address. This one-time-use link allows for secure access without the need for traditional passwords.

By employing passwordless authentication and advanced encryption for all customer data in transit (TLS 1.2+) and at rest (AES with 256-bit keys), ensures a secure and user-friendly experience.

Development Practices embraces agile methodologies, continuous integration (CI), and continuous deployment (CD) in our development process. OWASP Top 10 awareness is an integral part of our software development culture, and all code and configurations are maintained in a version control system, requiring peer review and approval before deployment. Automated code security analysis tools are utilized as part of our CI process.

Vulnerability & Incident Management

Our platform constantly evaluates vulnerabilities in OS packages and software libraries used in our applications. We utilize automated patching where possible and have an intrusion detection system to identify and alert us to any abnormal activities.

Vendor Management conducts thorough risk assessments for new vendors to ensure their alignment with our security and privacy policies. We have Data Processing Agreements in place with all vendors that process personal data on our behalf as a processor.

Security Measures

At, we prioritize implementing robust security measures to protect our platform and user data. Our development team is committed to:

  • Conducting thorough internal code reviews to ensure high-quality, secure code.
  • Continuously monitoring and updating our platform to address potential vulnerabilities and security risks.
  • Following industry best practices for software development and infrastructure security.

By focusing on these measures, we strive to maintain a secure and reliable platform for our users, even without formal security audits.

Continuous Improvement

We are committed to continuously improving our security posture. actively seeks feedback from users, security experts, and partners to identify potential areas for improvement and implement enhancements to our security practices.

Stay Informed and Get in Touch

We understand the importance of transparency and communication when it comes to security. If you have any questions, concerns, or suggestions about our technology and security practices, please feel free to contact us by filling out the contact form on our website.

Last Updated: 02/04/2023 reserves the right to update or modify this Technology and Security Overview at any time to reflect changes in our practices or applicable laws. We encourage you to review this page periodically to stay informed about our technology and security practices.

Frequently asked questions
  • uses Transport Layer Security (TLS) to encrypt data in transit and Transparent Data Encryption (TDE) in PostgreSQL for data at rest.
  • Yes, supports Google Login and Email Magic Link Login as passwordless authentication methods for a secure and user-friendly experience.
  • continuously assesses vulnerabilities, implements automated patching where possible, and maintains an intrusion detection system along with a dedicated incident response team.
  • Yes, minimizes personal data processing and maintains GDPR-compliant Data Processing Agreements and Privacy Policies.
  • follows agile methodologies, continuous integration, and continuous deployment, with a focus on OWASP Top 10 awareness and regular internal code reviews.
  • You can reach out to with any security-related questions or suggestions by filling out the contact form on the website.