version 11.1.2021
Preamble
Data privacy and security are top priorities for Aster Key. They are the DNA of our business, and key to your experience with our product. Aster Key is committed to:
We patented key components of our data privacy and security system in, Patent No. 11,170,130, issued 11/9/2021, titled: “Apparatus, Systems and Methods for Storing User Profile Data on a Distributed Database for Anonymous Verification”
Data from the Aster Key back end (servers) to your mobile application (mobile app), as well as to lenders, is transmitted securely via end-to-end encryption via an HTTPS endpoint. We also encrypt all transmitted data using AES-256 bit encryption, as well as encrypt all data at rest. Aster Key stores all your personal and financial data separated in your mobile app and never passes them together in the lender API. Our backend does not store or have direct access to your data in your Aster Key app vault (on your mobile phone) as its access and use is controlled by you.
Mobile Application Data
Once the data is aggregated it is removed for the back end and passed securely to your mobile app. It is now available and stored encrypted when at rest in your mobile application.
All data in your mobile application, as well as any non-financial and non-personal data on the Aster Key servers, is encrypted at rest. If a hacker was ever able to penetrate and access any portion of the physical storage on your mobile device it would be impossible to read the data without decryption of the various data stores independently, which would need the keys which are not available. The information in your mobile application is a useless string of jumbled random characters and is more secure than website backend data stores.
Aster Key Server Communication
Encryption in transit within the Aster Key back end as well as encrypting all data at rest adds another layer of security protection when back end maintenance is needed without compromising data security and privacy. Not even our internal software engineers can see your data passing through our back end. If a hacker gains access to our back end they cannot see your data while it is passed. The limited data stored at rest is secured using the same principles as noted above.
Where and how your data is stored
A passphrase is created by you. This is linked to an internal unique identifier (snowflake) that identifies you, anonymously, to our system. As part of the account creation process, you are provided a public anonymous ID that is used when you send your financial data to a lender. I.E, a lender sees your financial data but not your personal information such as your name, address, social security number or email – so at this point you cannot be identified. The final step in account creation is verification of your mobile number which is linked to your internal unique identifier.
You create your (verified) financial profile by logging into your payroll, bank and investment accounts from your Aster Key app via services such as Plaid, Finicity and Argyle which have connections to financial institutions, companies you work for, or to payroll companies such as ADP or Paychex.
You can add your personal data from the “settings” screen. Personal data is not required to send out requests for offers as this is done “anonymously”. You transmit your personal data if you accept the offer.
New mobile phone, or loss of your mobile phone
Your mobile phone (mobile device) is your key to your personal information – as well as all your financial data, both of which are encrypted end to end and stored on your phone.
No personal data and financial data commingling
To maintain your privacy as well as increase the overall safety of your data we do not store your financial and personal data together.
Benefits to Aster Key’s anonymous financial data transmission, and no commingling of personal and financial data
When Aster Key hires full-time W2 employees, it will conduct background checks for all new hires, including verification on the following:
We do not currently conduct background checks for our 1099 and consulting firms.
To ensure continuity with respect to securing your data, all employees receive onboarding and systems training, including environment and permissions setup, security policies review, company policies review, and corporate values training.
All employees are required to review security policies as part of onboarding and are encouraged to collaborate and enhance our policies during peer reviews. All changes are managed in our GIT repository so engineers can review and collaborate before they become policy. All updates are passed to employees and added to the training.
After our beta period, Aster Key will use a 3rd party to perform annual penetration testing. Your financial and personal data is not exposed during these tests. We create a close of our systems that does not contain any of our customer’s personal or financial data for these tests.
All findings linked to vulnerabilities that can be exploited through penetration testing are used to set remediation priorities.
The mobile applications go through a security test as part of each new version release.
Intrusion detection and prevention systems (IDS/IPS)
Aster Key uses signature-based security and algorithm-based security to dynamically identify traffic patterns that align with known attack methods.
The key benefit of IDS/IPS is linked to tightly controlling the size and make-up of the attack telemetry, using intelligent detection controls at data entry points. The time it takes to automatically remedy new threats, as well as proactive prevention of known threats from accessing the system in the first place.
Along with passphrase login, two-factor authentication (2FA) provides additional security to your data stored in the Aster Key application. We highly recommend the use of 2FA as an integral step towards securing your data. Aster Key users can turn on @FA in the settings screen and can use universal second-factor applications like “Authy” or SMS as second factors.
Aster Key uses continuous delivery of enhancements and modifications. All new or modified code changes are committed, tested, shipped, and iterated in a rapid sequence. We use a continuous delivery methodology, which includes pull requests, continuous integration (CI), and automated error tracking. Our goal is and processes are aligned to significantly decrease the likelihood of a security issue. These flows also improve our response time to the effective removal of bugs and vulnerabilities. We use Github release notes and change management through the GitHub SDK to manage our code.
Aster Key, after out beta period, will proceed to complete the following compliance certifications including but not limited to:
Aster Key is GDPR compliant.
CCPA (California Consumer Privacy Act)
Aster Key is CCPA compliant. Our Data CCPA data processing overview provides assurances and a path to learn how your data is used as well as a way to clear out your data. Aster Key does not retain, use or disclose personal data. You maintain all your personal data on your device within the Aster Key app. You control when and how it is used. Aster Key does not “sell” Personal Data within the meaning under the CCPA.