All systems operational · last verified 2026-05-18

Banking-grade security, transparently disclosed.

How we keep your account, your queries, and the platform itself safe — with explicit disclosure of what we have, what we're building, and what we don't yet claim.

HSTS preload Nonce CSP · strict-dynamic PIPEDA-aligned Quebec Law 25 Auth-gated APIs Canadian infrastructure
— Layer 1 of 4

Transport & browser-side controls.

Every request between you and Quintarthai is encrypted, nonced, and same-site-bound. The platform refuses to serve over HTTP, even on first visit.

🔒

HSTS preload

Submitted to the Chrome HSTS preload list. Every browser that ships with the preload (Chrome, Firefox, Safari, Edge) refuses HTTP on quintarthai.com.

StatusEnrolled
🛡

TLS 1.3

TLS 1.3 only. Modern cipher suites. Certificate via Let's Encrypt with 90-day auto-renewal.

CipherTLS 1.3 only
Renewal90-day auto

Content Security Policy

Strict-dynamic with per-request nonces. Blocks inline scripts not signed with the request's nonce. Reports go to /api/v1/csp-report.

Modestrict-dynamic
Nonceper-request, fresh

Cookies + CSRF

Session cookies are HttpOnly · Secure · SameSite=Strict. JWT for API auth carried in Authorization: Bearer header. State-changing endpoints reject cross-origin requests.

SameSiteStrict
CSRFSame-site + auth-header binding
— Layer 2 of 4

Backend & data.

All compute is Canadian-controlled. APIs require authentication. Secrets never leave the server. Monitoring catches anomalies before they become incidents.

Canadian-hosted

Canadian-controlled VPS (Hostinger KVM, Boston-fronted edge). Quintessentia Network Inc. (Niagara Falls, ON) is the data controller under PIPEDA.

ControllerQuintessentia Network Inc.
JurisdictionOntario, Canada

API gating

Every proprietary endpoint requires JWT auth. Rate-limited per user, per tier. Admin bypass requires explicit role flag.

AuthJWT · Bearer header
Rate limitRedis INCR · per tier

Secrets management

Environment-variable-only. No secrets in source. Rotation documented. SSH keys not shared.

Storage.env · server-only
SourceZero secrets in repo

Monitoring

Observability hooks on every API path. Status page tracks 6 components. CSP reports + 4xx/5xx alerts flow to the on-call channel.

Status/status
— Layer 3 of 4

Privacy posture.

User queries are retained 90 days for debugging then aggregated. Broker data stays in your browser. No third-party tracking. No participation in LLM training programs.

PIPEDA · Quebec Law 25

Dual-language privacy notices (English + French). All processing under Canadian privacy law. Right to access, correct, and delete granted by default.

Broker data stays local

Any holdings imported via brokerage CSV remain in your browser's localStorage. Never uploaded. Never persisted on our servers.

StorageClient-side only

No LLM training participation

We do not contribute user queries to model training programs. Our LLM providers (Cerebras, Groq) are configured to opt-out of training on our traffic.

TrainingOpt-out, server-enforced

Zero third-party tracking

No Google Analytics. No Facebook Pixel. No ad-network PII sharing. First-party observability only.

TrackersNone · audited
— Layer 4 of 4 · The honest section

What we don't yet claim.

Mercury hides their gaps in FAQ footnotes. We promote ours to the front. Most fintechs at our stage don't have SOC 2 either — we'd rather tell you up front than have you find out after.

In progress · target Q3 2026

SOC 2 Type II

Audit not yet completed. We meet most controls in practice (logging, access review, change management) but haven't been independently audited. Mid-stage fintech standard timing — we're aiming for completion by Q3.

Not yet started

ISO 27001

We don't have ISO 27001 certification. Required for some enterprise procurement processes. Will start the path once SOC 2 lands. Roadmap target: 2027.

Mitigated, not certified

Encryption at rest

Database is encrypted by the host filesystem (LUKS) but we don't manage the keys ourselves. Roadmap: customer-managed keys via Vault by end of 2026.

Why we publish this: Quintarthai's audience is sophisticated. You're going to ask us about SOC 2 anyway. We'd rather lead with the gaps than have to recover trust after you've found them. Mercury's security page hides the Evolve Bank deposit cap in their FAQ footnotes — we won't operate that way.

— Reporting

Found a vulnerability?

Email security@quintarthai.com. We acknowledge within 48 hours and aim to fix within 14 days for high-severity issues. No bug bounty yet — that's on the roadmap once we exit beta.

PGP key, expected response timelines, and our coordinated disclosure policy are at /legal/disclosures.html.

Privacy Policy

PIPEDA · GDPR · Quebec Law 25 compliant. Data stored in Canada. No third-party trackers. No LLM training on your data.

Read the full privacy policy →

Terms of Service

Service-as-information disclaimer · informational research only · not investment advice · institutional-grade source attribution.

Read the full terms of service →

Cookie Policy

Essential cookies only by default · HttpOnly session · CSRF token · localStorage for theme + preferences · zero analytics/marketing trackers unless explicitly opted in.

Read the full cookie policy → ·

Disclosures

Affiliate relationships · regulatory disclaimers · backtest assumptions · methodology transparency.

Read the full disclosures →

AI Transparency

Quinn is powered by Claude (Anthropic) + Cerebras Llama. Citations always show source · no fabricated quotes · model and version visible on every response · zero LLM training on user data.

Read the full AI transparency policy →