Security Policy

LetMobile takes the security of your data very seriously. Everything that is stored on or goes through LetMobile is encrypted, both in transmission and storage.

Last updated: June 4, 2013

  • Secure Infrastructure

    All data that is stored on or that goes through the LetMobile servers and databases is encrypted using the AES-256 standard, which is the same encryption standard used by banks to secure customer data. In addition, LetMobile does not store the encryption/decryption keys, ensuring that even if its servers are compromised an attacker might only access encrypted data, with no means to read it.
    LetMobile uses the Amazon EC2 Web Service. Amazon stores its data over several large-scale data centers. According to Amazon, they use military grade perimeter control berms, video surveillance, and professional security staff to keep their data centers physically secure.

    More information on Amazon's security can be found at the Amazon Web Services' website.

    In addition, LetMobile applies proprietary mechanisms to ensure that its services and software are not subject to common attacks such as SQL injections and Cross Side Scripting (XSS).

  • Secure Transfers

    All transmission of data occurs over an encrypted channel (SSL). Any data transferred from LetMobile over the Internet is securely encrypted.

    Amazon and LetMobile also employ significant protection against network security issues such as Distributed Denial of Service (DDoS) attacks, Man in the Middle (MITM) attacks, and packet sniffing.

  • Privacy

    A copy of our privacy policy can be found here

    We understand and guard your privacy to the best of our ability. We do our utmost to protect your information from unauthorized access.

    LetMobile employees are prevented from viewing restricted data that is stored on or goes through LetMobile as this data is encrypted at all times, with the decryption key not available to LetMobile. In addition, we employ a number of security measures to protect user information from unauthorized access.

  • I think I've found a security exploit. Where do I report security concerns?

    Our top priority is making LetMobile safe for all of its users. While we're very confident in our security technology, we prefer to investigate any and all reported security concerns with any of LetMobile’s services or software.

    For a direct line to our security experts, report security problems to