Security

Last updated: April 2026

Your financial data is one of the most sensitive categories of information you will ever entrust to software. Folko is built accordingly: encrypted in transit, encrypted at rest, isolated at the database level, and never sold to anyone.

1. Data in transit

All connections between your device and Folko's servers are encrypted with TLS. HTTP is not supported — the folko.io domain enforces HTTPS via a 2-year HSTS preload directive, and the mobile app only talks to Supabase over TLS.

2. Data at rest

Your cashbooks, transactions, and members are stored on Supabase cloud infrastructure with encryption at rest. On your device, local data lives in encrypted SQLite and MMKV storage, protected by the operating system's data-protection APIs (iOS Keychain / Android Keystore).

3. Account isolation

Every table in our database is protected by Row Level Security (RLS) policies. The policies are enforced at the Postgres layer itself, not in application code — meaning even a bug in Folko's API cannot let one user read another user's data. The only cross-user access allowed is between co-members of the same cashbook, and only for that cashbook's contents.

Privileged database functions run with fixed search_path and validate the calling user's identity before returning any data. The service-role key that can bypass RLS is never exposed to the client — it is used exclusively inside server-side edge functions.

4. Web security headers

The folko.io website ships with a restrictive set of HTTP security headers on every response:

5. Code and operational security

We follow industry-standard secure-development practices:

6. What Folko does not do

7. Breach notification

If we discover a security breach that affects your personal data, we will notify affected users by email without undue delay and publish a public incident report at folko.io/security describing what happened, what data was affected, and the steps we took to contain and remediate it. We will not quietly patch and move on.

8. Reporting a vulnerability

If you believe you have found a security issue in Folko — in the app, the website, or the backend — please email hello@folko.io with the subject line "Security" and as much detail as you can share (reproduction steps, affected endpoints, screenshots). We will acknowledge receipt within 72 hours and keep you updated as we investigate.

We ask that you do not publicly disclose the issue until we have had a reasonable opportunity to fix it, and that you do not access, modify, or delete other users' data while testing. Researchers who follow responsible disclosure will be credited in the release notes when the fix ships, unless they prefer to remain anonymous.

9. Subprocessors

A detailed list of third-party Subprocessors we rely on, the data each receives, and their location is maintained in our Privacy Policy at folko.io/privacy (Section 3).

10. Honest limits

No system is 100% immune, and Folko is not an exception. We do not use the phrase "end-to-end encrypted" because we hold the keys to your data on the server side — anyone telling you they run a multi-device sync product with true end-to-end encryption and searchable cloud data is either using a narrow technical definition of the term or stretching the truth. What we can honestly say is this: your data is encrypted in motion and at rest, isolated from other accounts at the database level, never sold, and under constant adversarial review. If that changes, this page changes with it.