How we protect your data, your subscriptions, and our infrastructure.
Defense in Depth
Every request to The Trinity Beast passes through multiple layers of security before it reaches our servers. Each layer is designed to stop a different type of threat.
UDP Flame Path — Bypasses CDN, WAF, and ALB for lowest latency
Dashed line — Monitoring / logging flow
Allowed — Passed all security checks
The UDP Flame Path — The gold path on the diagram shows the UDP direct route. It bypasses CloudFront, Shield, both WAFs, and the ALB — going directly from the Network Load Balancer to the container. This eliminates 5 network hops and delivers sub-millisecond response times for latency-critical applications like trading bots and real-time dashboards. TCP requests pass through every security layer. UDP trades that inspection for raw speed — the application still validates API keys and enforces rate limits at the container level.
DDoS Protection
AWS Shield Standard automatically absorbs volumetric attacks at the network edge. CloudFront distributes traffic across 400+ global edge locations, making it extremely difficult to overwhelm our infrastructure.
Automatic
Web Application Firewall
Two WAF layers inspect every request. Known malicious IPs are blocked on sight. SQL injection, cross-site scripting, and code injection attempts are detected and rejected before reaching our servers.
Real-Time
Rate Limiting
Multiple layers of rate limiting protect against abuse. The WAF blocks IPs exceeding 2,000 requests per 5 minutes. The application enforces per-tier QPS limits. Admin endpoints have a separate, stricter threshold.
Multi-Layer
Encryption Everywhere
All data is encrypted in transit (TLS 1.2+) and at rest. API traffic, database connections, cache communication, and website delivery — every path is encrypted. No exceptions.
TLS 1.2+
Threat Detection
AWS GuardDuty continuously analyzes network traffic, API calls, and DNS queries for signs of compromise — credential theft, cryptocurrency mining, unusual access patterns. Findings trigger immediate alerts.
Continuous
Audit Trail
Every API call to our AWS infrastructure is logged by CloudTrail. VPC Flow Logs record all network traffic. Nothing happens without a record. Full accountability, full transparency.
Every Action Logged
Payment Security
We never see, store, or process your payment information. All payment handling is done by Stripe.
Stripe Handles Everything
Card numbers, bank details, and billing information go directly to Stripe — a PCI Level 1 certified payment processor. Our servers never touch your payment data.
Secrets Management
API keys, database credentials, and Stripe keys are stored in AWS Secrets Manager — encrypted, access-controlled, and rotatable. Never hardcoded, never in environment variables.
Webhook Verification
Every Stripe webhook is cryptographically verified using signing secrets before processing. Forged or tampered webhook events are rejected immediately.
Our Privacy Promise
We do not use cookies — not for tracking, not for analytics, not for anything.
We do not use third-party trackers, pixels, or advertising scripts.
The only data stored on your device is your preferred language setting — one key in localStorage.
Our analytics are anonymous — no names, no emails, no IP addresses stored.
We do not sell, share, or rent your data to anyone. Ever.
Payment data goes directly to Stripe. We never see your card number.