- Security Overview
- Security Whitepaper
- Your Privacy
- Technical foundations for a zero-knowledge platform
- Do you offer disk encryption?
- What does Paperspace log?
Paperspace is designed with security as the primary consideration. We know that security is the cornerstone of all business, and we are committed to providing the world’s most trusted virtual desktop environment. In today’s environment, knowing that your company’s data is secure, permissions managed, and isolated from possible attackers is an essential requirement for moving to the cloud. Paperspace exceeds on all fronts and can become a primary pillar of your secure IT infrastructure.
Visit paperspace.com/security for more information.
Download our Security Whitepaper here.
We care deeply about privacy issues on the web. Paperspace is a ‘zero-knowledge’ company which means we do not have access to your personal information on your Paperspace desktop. Your Paperspace password is stored using 2048 bit encryption and is not accessible to anyone except you.
Paperspace is built with the mindset that only you have access to your data, and we work tirelessly to engineer solutions that live up to this goal. This happens at the application layer, the network layer, and the physical data center (for our hosted offerings).
All communications to and from your Paperspace VM are secured over a fully encrypted channel.
- Encrypted stream between client and a remote server (SSL/TLS) independent of platform — web, desktop, or mobile.
- Traffic between our database, web servers, API, and internal networks is also encrypted (SSL/TLS)
- Database secured with 256-bit AES or higher.
- We use 2048 bit public keys in our certificates and support only high-strength symmetric ciphers.
We do not yet support disk encryption out of the box. It is possible to use third-party tools if they do not require a change to the hardware (example: TPM).
We monitor the health of our application, the Virtual Desktop Agent (VDA) running inside the VM. The VDA is responsible for audio and video streaming, VM lifecycle events such as starting and stopping Windows state, and other auxiliary services like copy/paste sync, drag and drop upload, etc.
The VDA log does not contain any personally identifiable information, nor does it include any information regarding other applications or files on the VM.
Reporting of VM health (CPU load, network connectivity, etc.) is gathered at the virtualization layer outside the context of the OS.