
As of 2022, I will only be seeing new clients that are able to send me a copy of their photo I.D during the application process. Your I.D. will be uploaded to a GDPR compliant, end-to-end encrypted cloud service named Tresorit which automatically terminates access to the uploaded document 7 days after receipt.
I do hope that all new potential clients can understand that I have implemented this change for my safety and peace of mind. Trust and security are fundamental parts of BDSM and something I am unable to thoroughly relax and enjoy my craft without. I have been working in this industry for nearly 10 years and I pride myself on my trustworthy reputation. I put the safety of myself and my clients above all else, and always will do. Thank you for your understanding.
Tresorit ensures data security and compliance with end-to-end encryption in its cloud with zero-knowledge authentication, cryptographic key sharing and client-side integrity protection. All personal data is kept safe through architectures designed to ensure regulatory compliance. Tresorit is ISO 27001, GDPR, DPA, HIPAA and CCPA compliant. Tresorit also allows for password protection and notifications every time your document is viewed. The file will be available to view for 7 days, and then it will be permanently deleted from the cloud.
Further information:
-
Tresorit handles data under Swiss privacy laws that provide more substantial protection than similar laws in the US or even the EU.
-
The non-convergent cryptography used by Tresorit makes it impossible to determine when your content matches others’ content in the cloud, which could leak valuable data about you to outside observers.
-
Tresorit servers are located in highly secure Microsoft Azure data centers in Ireland and the Netherlands. Your stored content and all relating metadata, such as your settings and email address, will be removed from Tresorit's system 14 days after your link expires.
-
Tresorist apply symmetric keys and the AES-256 encryption algorithm to encrypt data uploaded to the cloud. The secure link includes the key for decryption on the recipient's side. This key is never revealed on Tresorit's side, meaning only you and the link recipients can decrypt the files.
-
Tresorit guarantees that a file’s content cannot be modified without your knowledge, even if somebody hacks Tresorit's system. Tresorit clients apply cryptographic authentication (in the form of HMAC or AEAD) to all encrypted data. The key is only known to the user’s client and those they share the file with, but not the server.
-
Tresorit is based on industry-standard public key cryptography that has been thoroughly analyzed by experts and declared secure. Public key cryptography guarantees that even Tresorit cannot access the shared keys. This key sharing is based on, among others, RSA-4096 with OAEP padding scheme (see RFC2437) and PKI certificates, combining it with a tree of symmetric keys.