Our privacy team continuously researches multi-platform applications and environment. We examine application data is not securely stored locally (at rest), operated in memory (in use), transfered o...view moreOur privacy team continuously researches multi-platform applications and environment. We examine application data is not securely stored locally (at rest), operated in memory (in use), transfered over network (in-transit), and available due to weak defense mechanisms. We do not break any applications and are not looking for common software vulnerabilities. Instead, we perform our tests by making an environment insecure. It helps us to identify weak chains in application to simulate situations when particular application is not able to protect its data. Also, we help developers make their application more secure and capable to protection customers data. All our results are on home page and research & reports page to keep everyone secure and aware.view less