Trust & Security

How Torify is built, operated, and secured.

Infrastructure

Torify runs on Cloudflare Workers — a globally distributed edge compute platform. There are no origin servers to patch or expose. All traffic is proxied through Cloudflare's network, which provides DDoS protection and TLS termination by default.

Security Headers

Every response from Torify includes the following security headers:

Strict-Transport-Security: max-age=31536000; includeSubDomains
X-Content-Type-Options: nosniff
X-Frame-Options: DENY
Referrer-Policy: strict-origin-when-cross-origin
Permissions-Policy: geolocation=(), microphone=(), camera=(), payment=()
Content-Security-Policy: default-src 'none'; style-src 'unsafe-inline'; img-src 'self' data:

Authentication & Payment Security

Two authentication methods are supported:

Data Handling

Torify processes only the parameters necessary to fulfill each API request:

See the Privacy Policy for full details.

Responsible Disclosure

We take security seriously. If you discover a vulnerability, please report it responsibly:

Email: contact@torify.dev

Subject line: "Security Vulnerability Report"

We will acknowledge your report within 48 hours and aim to resolve confirmed issues within 14 days. We do not currently operate a formal bug bounty program, but we appreciate responsible disclosure.

RFC 9116 Security Contact

Machine-readable security contact information is available at /.well-known/security.txt per RFC 9116.