Skip to main content

How are my files kept secure?

Updated over 5 months ago

Your files are protected by multiple layers of security designed to ensure only you (and authorized Loophole systems) can access them. Here's how we keep your documents, images, and data safe.


Secure cloud storage

Your files are stored in AWS S3 - a secure, enterprise-grade cloud storage system used by major companies worldwide. Files are not stored on the Loophole website itself, but in a dedicated, encrypted storage infrastructure.


Time-limited access links

Every time you access a file, Loophole generates a temporary, secure access link. These links:

  • Expire after 5 minutes

  • Work only for the specific file they were created for

  • Cannot be shared or reused by others

  • Are cryptographically verified

This means even if someone intercepted a file link, it would stop working within minutes - and they wouldn't be able to use it to access other files.


Ownership verification

Before any file can be accessed, Loophole verifies:

  • You are logged into your account

  • The file belongs to you

  • Your session is valid and active

Only you (or Loophole administrators, when necessary) can view, edit, or delete your files. There's no way for other users to access files that don't belong to them.


Protected file actions

Every action you take on a file - uploading, renaming, adding notes, deleting - is protected by security verification. This prevents:

  • Unauthorized file modifications

  • Cross-site request forgery attacks

  • Session hijacking attempts


Encrypted connections

All file uploads and downloads happen over encrypted HTTPS connections, ensuring your data is protected in transit between your device and our servers.


Viewing file access logs

You can see every time your file has been accessed - including by Loophole AI.

To view your file's access history:

  1. Go to your Files page

  2. Click on any file to open the file details

  3. Select the Logs tab

The Logs tab shows you:

  • Every upload, edit, or deletion action

  • When Loophole AI analyzed or updated the file

  • The date and time of each action

  • The IP address associated with each action (when applicable)

When Loophole AI accesses your files for processing, these actions are logged as "system actions" and clearly labeled. You'll see entries like:

  • "Loophole AI updated file name and added AI data"

  • "AI processing completed"

This gives you complete transparency into who has accessed your files and when.


What Loophole can see

For files you upload, Loophole's AI systems automatically:

  • Analyze images to generate descriptions

  • Extract text from documents via OCR

  • Transcribe video and audio content

  • Categorize files by content type

This processing is done to make your files searchable and useful within Loophole tools. All AI analysis happens securely within our infrastructure, and these actions are logged in your file's history.


Admin access

Loophole administrators can access your files when:

  • Troubleshooting technical issues you've reported

  • Responding to legal obligations

  • Investigating security or policy violations

Admin access is limited, logged, and only used when necessary.


What about deleted files?

When you delete a file, it's removed from our active storage and moved to a temporary holding area. Files in this area automatically expire and are permanently deleted after 1 day.

Once expired, files cannot be recovered by anyone - including Loophole.


No public links

Your files are never publicly accessible. There are no "share links" or public URLs. Files can only be accessed by:

  • You (while logged in)

  • Loophole AI systems (for processing)

  • Loophole administrators (when necessary)


What if my account is compromised?

If you believe your account has been compromised:

  1. Change your password immediately

  2. Review your file access logs for suspicious activity

  3. Contact support at Security [at] Loophole (dot) com

We monitor for unusual access patterns and will notify you if we detect suspicious activity on your account.

Did this answer your question?