The security whitepaper about our end-to-end encryption

Thank you! Your submission has been received!
An error occurred while sending the data. Try again.

Your logins are end-to-end encrypted

Stored with the utmost care

What makes our vault so special?

End-to-End Encryption
The operator and data center cannot decrypt the ‘vault’ and thus cannot access logins.
GDPR compliant
We do not collect unnecessary data about you (data minimization).
Made in Germany
No Amazon or Google Cloud. Company and infrastructure in Germany.
ISO 27001-certified information security management system of the data center
Why phone confirmation is secure

Phone instead of a master password

Secure chip in your phone
Cryptography
heylogin uses XSalsa20 + Poly1305 and Curve25519, secure state of the art encryption algorithms.
Two-Factor Security
Smartphone (1st factor) + fingerprint or PIN (2nd factor)
Secure browser logins

Replacing insecure password logins

Always protected
Your logins are secured and encrypted all the way to the website.
Single Sign-On experience
heylogin implements a Single Sign-On experience that works with all websites, without integration costs.
Login everywhere securely
The data exchange between your browser and your phone is secured by a key exchange protocol.
Protection against phishing
heylogin always shows you whether you log into a trusted website.
Founder Dr. Dominik Schürmann
Dr. Dominik Schürmann
Founder, heylogin