How Torify is built, operated, and secured.
Torify runs on Cloudflare Workers — a globally distributed edge compute platform. There are no origin servers to patch or expose. All traffic is proxied through Cloudflare's network, which provides DDoS protection and TLS termination by default.
Every response from Torify includes the following security headers:
Two authentication methods are supported:
Torify processes only the parameters necessary to fulfill each API request:
See the Privacy Policy for full details.
We take security seriously. If you discover a vulnerability, please report it responsibly:
Email: contact@torify.dev
Subject line: "Security Vulnerability Report"
We will acknowledge your report within 48 hours and aim to resolve confirmed issues within 14 days. We do not currently operate a formal bug bounty program, but we appreciate responsible disclosure.
Machine-readable security contact information is available at /.well-known/security.txt per RFC 9116.