All data is protected with multiple layers of end-to-end encryption (E2EE):
ZERO PLAINTEXT ON DISK
Our processing pipeline ensures that no unencrypted genetic data ever touches disk. Files are encrypted at the application layer before any storage operation. All external storage (local disk, S3, GenomiX vault) only handles opaque encrypted blobs.
FILE ENCRYPTION (LGCR FORMAT):
- •X25519 ECIES — Elliptic Curve Integrated Encryption Scheme with ephemeral keys
- •AES-256-GCM — Authenticated encryption for file contents
- •gzip compression — Applied before encryption for storage efficiency
- •Per-profile encryption keys — each genetic profile has independent X25519 keypairs
- •Storage-agnostic — encrypted blobs can be stored on any backend without special security configuration
HEALTH DATA ENCRYPTION (PPK):
All health and biometric data in the database (blood tests, bioimpedance, epigenetics, medications, reports, clinical notes) is encrypted with per-profile ECIES (X25519 ECDH + HKDF-SHA256 + AES-256-GCM).
- •PPK v1 — Standard encryption for short fields (titles, metadata)
- •PPK v2 — gzip compressed before encryption for large content (report markdown), achieving ~60-70% size reduction in the database
- •Decryption auto-detects v1/v2 — fully backward-compatible
- •Domain separation: distinct HKDF info prevents key reuse across genetic and health encryption contexts
GENOTYPE-LEVEL ENCRYPTION (GenomiX Vault):
- •AES-256-PRF — Per-genotype encryption with hardware-accelerated AES-NI
- •HMAC-SHA256 — File-level integrity verification
- •ECIES envelope — Ephemeral X25519 key exchange with HKDF key derivation
- •Individual genotype values are encrypted independently — compromising one does not reveal others
REPORT DIGITAL SIGNATURES (Ed25519):
All generated reports are digitally signed with per-profile Ed25519 keys, providing:
- •Integrity — any modification to report content invalidates the signature
- •Authenticity — proves the report was generated by the system for a specific profile
- •Non-repudiation — the signature cannot be forged without the profile's private key
- •Signature covers: profile ID, report ID, SHA256(title), SHA256(content), and timestamp
- •Pipeline: plaintext is signed before compression and encryption; verification happens after decryption and decompression
- •Visual indicator: each report displays a Verified (blue), Unsigned (gray), or Invalid (red) badge
KEY ENCRYPTION AT REST (KEK):
- •Profile private keys are encrypted in the database using AES-256-GCM envelope encryption
- •KEK (Key Encryption Key) is stored separately from encrypted data
- •Defense-in-depth: even if the database is compromised, private keys cannot be extracted without the KEK
CRYPTO SHREDDING
- •Deleting a profile's private keys renders all associated data permanently unreadable — genetic files, vault data, health records, and reports
- •LGCR encrypted files, GenomiX .gxd vault files, PPK-encrypted health data, and signed reports all become undecryptable
- •Per-profile granularity — shred one profile without affecting others in the same account
- •Irreversible by design — no recovery mechanism exists once keys are deleted
DATA IN TRANSIT
- •TLS 1.3 for all communications
- •HSTS enabled with preloading
- •Certificate Pinning in applications