Data Security.
Syncc uses bank-grade encryption and a security-by-design architecture to protect your personal data, location, and all platform activity.
Cryptographic Controls.
Our engineering team maintains a security-by-design philosophy. Every signal transmitted through the Syncc platform is protected by multiple layers of encryption from the moment it leaves your device.
AES-256 Bit Encryption
All data at rest — including your profile, photos, outfit data, and preferences — is encrypted using 256-bit Advanced Encryption Standard keys. Your data is unreadable to anyone without the decryption key.
TLS 1.3 Transport
All data in transit between the Syncc app and our servers is protected by TLS 1.3 — the latest and most secure transport protocol — preventing interception, eavesdropping, and man-in-the-middle attacks.
Ephemeral Location
Proximity trace data is automatically purged within 15 minutes of inactivity. We never build a permanent log of your physical movements.
Device Binding
Accounts are bound to verified phone numbers and unique device identifiers to prevent account takeover, sharing, and fraudulent access.
JWT Authentication
All API requests are authenticated using signed JSON Web Tokens with short expiry windows. Tokens are validated server-side on every request.
Social Login Security.
When you sign in with Google, Apple, or Facebook, authentication happens entirely on those providers' secure infrastructure. Syncc never receives or stores your social media password. We only receive a verified identity token to confirm your identity.
Google Sign-In
OAuth 2.0 via Google Identity Services
Sign in with Apple
Apple's privacy-preserving authentication with email relay
Facebook Login
Facebook SDK with limited, declared permissions only
Infrastructure & Hosting.
The Syncc backend is hosted on secured, enterprise-grade infrastructure with daily automated backups, DDoS protection, and isolated database environments. No user data is stored on public-facing servers.
Our servers are located in India, in compliance with applicable data localisation requirements.
Responsible Disclosure
Found a security vulnerability? We welcome responsible disclosure from security researchers. Please report privately and we will respond within 48 hours.
support@syncc.in