End-to-End Protection
Transaction data is protected using strong encryption techniques so sensitive records are not exposed casually.
Security Key
A unique encryption key is used as part of the app security design for stored transaction information.
OTP and PIN
Users sign in with OTP and can return through PIN verification to keep the app locked from casual access.
Commitment
Privacy first, secure by default.
SpendLog focuses on secure storage, controlled access, and ongoing improvement of security practices as the product grows.
Private by default
Secure storage
Ongoing monitoring