Architecture at a glance
High-level flow of data through the current ContactVault applicant-side mail system.
ContactVault
ALPHA v.1.0
High-level flow of data through the current ContactVault applicant-side mail system.
All sensitive payloads are sealed using an authenticated cipher (XChaCha20‑Poly1305) and keys derived with HKDF‑SHA256. Each record receives its own random salt and nonce, giving strong confidentiality and integrity.
Employers do not see an applicant’s personal email address by default. ContactVault issues mailbox addresses on the applicant side so first contact and replies can happen without exposing the applicant’s personal inbox.
Verification links, applicant login links, and sensitive actions are protected with HMAC signatures, embedded nonces, and explicit expiration. Tokens are verified on every use and marked as consumed to prevent reuse.
Public entry points enforce burst limits, daily quotas, email/IP throttles, and optional proof-of-work to slow down automated abuse without penalizing normal applicants.
Operational data is stored only as long as needed to deliver messages, receive replies, support applicant access, and prevent abuse. Retention jobs clean up automatically so old data does not linger.
Strict defaults are shipped for common web risks.
Detailed audit logging, health checks, and alert thresholds help us detect anomalies fast. Outbound email is validated and sensitive fields are redacted in logs.
If you believe you’ve found a security issue, please use our responsible disclosure channel. We review reports quickly and appreciate coordinated fixes.
These are incremental upgrades on top of a security model already centered on applicant-controlled communication.