Security First. Always.
QRTrusty is built to protect your brand, your verification data, and your customers’ trust. We apply strong security practices across encryption, access control, monitoring, and abuse prevention.
Infrastructure Security
QRTrusty operates on secure cloud infrastructure with modern protection layers designed to reduce attack surface and prevent unauthorized access.
- Encrypted HTTPS (TLS)
- Secure API architecture
- Rate limiting & abuse protection
- Request filtering and safety controls
- Encrypted storage practices
Data Encryption
We protect data with encryption during transmission and secure handling at rest where applicable.
- In transit: traffic is served over HTTPS.
- At rest: data is stored using secure cloud database protections.
- Token safety: verification logic is protected against brute force attempts.
Authentication & Access Control
Only authorized users can access dashboards and tenant resources. Access is restricted by authenticated sessions and permission rules.
- Secure sign-in via Firebase Authentication
- Tenant-aware access boundaries
- Session validation & token verification
- Admin-only controls for sensitive operations
QR Verification Protection
Our verification flow helps detect duplication and suspicious scanning patterns. Verification events can be logged for audit and analytics purposes.
- Unique mapping for codes
- Scan tracking and verification history
- Device and location signals (where available)
- Suspicious activity detection
Monitoring & Abuse Detection
We monitor for unusual behavior to protect tenants and end users from exploitation attempts.
- Abnormal scan frequency
- High-risk IP behavior
- Repeated invalid verification attempts
- Flagging suspicious patterns for review
Privacy Commitment
QRTrusty does not sell verification data. Verification logs are used to operate the service, protect against abuse, and provide analytics to the brand owner.
- No selling of tenant verification data
- No third-party advertising use
- Data access limited to authorized tenant users
Report a Security Issue
If you believe you’ve found a security vulnerability, please contact our team immediately. We take responsible disclosure seriously and investigate promptly.
Note: Please avoid sending sensitive customer data in email. Provide steps to reproduce and relevant screenshots/logs when possible.